00000", 0x39}], 0x1}, 0x0) 16:22:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:01 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x0) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000140)={0xc, "268bc7fcc1d599564bdccd4e2b7d51e1306924855b3f907e7338fc7b6c147411687273da6f1f4ea9c0f6ec0726c47aa21e3e1b631c3b1f0602f765977ecf8d9cbb9e19021f0cf9efda5fff6eba28171b694a692d4082a3470dccb025330766970c8fea84ab3d0e4735f0ec21213ef1cadf3e60e6d77e46388575f100e26f8190"}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0xfffffffffffffec2) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) write$9p(r1, &(0x7f0000000200)="d6a00c1ecf3487368b8af90c5f053454d5152f8c83db4206f52fadf57157d515fc3bddb2c3d96329a4bf278cc6f7aebfee87104b775ce20f5957799ff0290527b6cab7651cb16f74bcd2c3b5ef46df265fd1e4a653191a5295a7ab5783d695fed4068adf61979f373257ac97208f9c3170bc0297dd63cfa9e957177c01d8427a3f3348b1a689b28b6a07845b1e8af9ea37", 0x91) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000002c0)=0x8, 0x4) r3 = accept$alg(r2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6tnl0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000340)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x35, r4}) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'skcipher\x00'}], 0xa, "4904d0469ffb84e6343ef778b8368d930a56d12c52a1629d21d354493c74872a44cb1df5a3a323b356422e51768929358f5ca0c1adad3d85e6b87bf0a19f0d5fe577539c700045191e171d3c0f076332d5a8183e49a815267b882790f5659ecb6e653484a3294bd9df0637bf10c78d444b87321eb1c41e307ec4b69b5267e1ef11fa4bcd079754219df6457decd1f5fb6385"}, 0xa7) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1584.427399][T15738] XFS (loop3): Invalid superblock magic number [ 1584.804332][T15771] XFS (loop3): Invalid superblock magic number 16:22:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000a0470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:02 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9e9, &(0x7f0000000240)="11dcac6826af34df219484bc0000000028a0c182a08395c1087f6b52ce0eb42c31689ca2408665e5e18a2748d43eeb42624a15a1de980b96") r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0xaf3, 0x1, 0x2, 0xfff, 0x1, {0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x1, 0x46d2, 0x7, 0x9f, 0xffffffff}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2, 0x13, "125eb724008000567726f1b6ab25c01c9580e2"}, &(0x7f0000000200)=0x1b) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0xffe2) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000f0470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:02 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) lseek(r0, 0x0, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xc00, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0x1000) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000600470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1585.483920][T15797] XFS (loop3): Invalid superblock magic number [ 1585.839541][T15826] XFS (loop3): Invalid superblock magic number 16:22:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfffffffffffffff7) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000570470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f0000000140)={0x4, 0xdc2}) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x10}], 0x1}, 0x0) 16:22:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000670470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x3c}], 0x1}, 0x0) [ 1586.424508][T15850] XFS (loop3): Invalid superblock magic number [ 1586.837457][T15882] XFS (loop3): Invalid superblock magic number 16:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/76) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000140)={0x18, 0x1, 0x0, {0x10001}}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000180)={0x5}, 0x1) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000a70470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:04 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0xc0}], 0x1}, 0x0) 16:22:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000c70470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:04 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0xec0}], 0x1}, 0x0) 16:22:04 executing program 0: prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$alg(r2, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="5801f215b238788378c4d30589145ab0b56caff24f9d40231e44486d312668efd4ea5d76e2cf104994ce7c8d26793a584c7e7e3e8c67196a0652ecf96e8bbadf913feeaff553b1431f1d5a2b83da0679dcc6db14a33ec40df63788bb545cbaff2748215005b5ba956a5760b38cf65f0c1c9dc361c2c4853bc06aa718dbdb2c3d41112e64ee8b713246a28f45ac0b6e7985917e81c751237b007a04ada2631ec69230f6e2fd072d4bd10ec6b3a26b", 0xae}, {&(0x7f0000000180)="3cc6d2a9a7506bca628039d7ea0e3c85f32c625c95a67ccee02ed5c01800b36768559708a3b2b2410f53979c0ec8017af6c028726d9eaff8dd6db285a5d0a6a58c5f08e310116eb88a0229ffc5efe95fac2bd63e5317c892d36542a25a47bb9d4ef71405b1e1695112210dbef3222941ad821a41b2c541293c4c2923", 0x7c}, {&(0x7f0000000200)="90bb6ab1e6e0d9df6eb2afda03529067d2ce68b7822f08eba0b91c9125a9ed9df23032b07e5cdaa28ef8a8693bfeb6e8b66beb943df86e674e0e7b9421044a65613c2cffa3bd0fd5d2d0cb892289027783b82086721cbb4d9d9e", 0x5a}, {&(0x7f0000000280)="a80ea908d2956230703c2fec569489270c90bd2fa97f1121142bc583d8ea20fec16a6e853aa71bc0bbc5a5843639fa7537683043329664fea888997e5e829047d73a3dc96763d65d75c7dbf8656aab6e3cb03132543a9d44ce6d1f39be6604afe16d09fcc30127d2287ea4f53f2d0a74eaf6db04da93c5d2e9f59264ca1918fa500880cbab67e2e3b08cb393ee30024de6dc41fa5e3ae9987b1fb0324cf3f825b98bac4d2dcf14374e8b9eecf864d8ae7c885697", 0xb4}, {&(0x7f00000003c0)="61104bf3fc4524e9d55dcc62cbac95cf0187fed3d5740f3a5b8d57459fe545e5e9f6e0536661fe327e95af6c54655e3b327d1b8dab977bacba8af41e4fbeb30ecfb407a4a34e5df1025de14ef602f7acee8c86c29f899703326e87a0e9f6828bb6e1b45c4d478218642e856d830bbe234fe52122fd0b933e7cb9c092b6a78aadd17a5130fde5e9c6f0d54385cd0794582884e3490326765e6c74157c4ef7cc5262cea80e7e87aa17b6ddb636c3b1d602ef67496d9a3e6c0967cea7ff39f2a5ff2fff744fb3bcf3", 0xc7}, {&(0x7f00000004c0)="037318caad3d6d2354c0f5e404f002098c8d73f70dc477892d5a93c2c3f01a4e9944a950f6438c4b2e60c085e38f07edba05a30e564182d5fd847b5aaaea7e7f222de3f721", 0x45}], 0x6, &(0x7f00000005c0)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x1048, 0x804}, 0x40001) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000016c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001680)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000001700)={0x8, 0x120, 0xfa00, {0x4, {0x5, 0x5, "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", 0xf7, 0x3ff, 0x6, 0x1, 0x8001, 0x3f89, 0x7, 0x1}, r4}}, 0x128) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000001840)=0x20000000000, 0x4) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) [ 1587.396171][T15905] XFS (loop3): Invalid superblock magic number 16:22:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000002070470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1587.780245][T15937] XFS (loop3): Invalid superblock magic number 16:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x580}], 0x1}}], 0x1, 0x0, 0x0) 16:22:04 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x33fe0}], 0x1}, 0x0) 16:22:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000003380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000006dc0)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000240)=""/130, 0x82}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x5, &(0x7f0000000300)=""/55, 0x37}, 0x6}, {{&(0x7f0000001440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x148, &(0x7f0000002880)=[{&(0x7f00000014c0)=""/40, 0x28}, {&(0x7f0000001500)=""/136, 0x88}, {&(0x7f00000015c0)=""/183, 0xb7}, {&(0x7f0000001680)=""/189, 0xbd}, {&(0x7f0000001740)=""/182, 0xb6}, {&(0x7f0000001800)=""/107, 0x6b}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x7, &(0x7f0000002900)=""/115, 0x73}, 0x8}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002980)=""/61, 0x3d}, {&(0x7f00000029c0)=""/122, 0x7a}, {&(0x7f0000002a40)=""/59, 0x3b}], 0x3, &(0x7f0000002ac0)=""/110, 0x6e}}, {{&(0x7f0000002b40)=@tipc=@name, 0x80, &(0x7f0000002e40)=[{&(0x7f0000002bc0)=""/50, 0x32}, {&(0x7f0000002c00)=""/134, 0x86}, {&(0x7f0000002cc0)=""/171, 0xab}, {&(0x7f0000002d80)=""/157, 0x9d}], 0x4, &(0x7f0000002e80)=""/231, 0xe7}, 0x6}, {{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002f80)=""/38, 0x26}, {&(0x7f0000002fc0)=""/84, 0x54}, {&(0x7f0000003040)=""/233, 0xe9}], 0x3, &(0x7f0000004740)=""/4096, 0x1000}, 0x400}, {{&(0x7f0000003180)=@hci, 0x80, &(0x7f0000003240)=[{&(0x7f0000003200)=""/53, 0x35}], 0x1, &(0x7f0000003280)=""/25, 0x19}, 0x5}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f00000032c0)=""/186, 0xba}, {&(0x7f0000007000)=""/126, 0x7e}], 0x2, &(0x7f0000003440)=""/178, 0xb2}, 0x9}, {{&(0x7f0000003500)=@x25={0x9, @remote}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004580)=""/92, 0x5c}, {&(0x7f0000004600)}, {&(0x7f0000005740)=""/206, 0xce}], 0x3, &(0x7f0000005840)=""/215, 0xfffffffffffffdef}, 0x6}, {{&(0x7f0000004680)=@can, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000005940)=""/4096, 0x1000}, {&(0x7f0000006940)=""/196, 0xc4}, {&(0x7f0000006a40)=""/240, 0xf0}, {&(0x7f0000006b40)=""/11, 0xb}, {&(0x7f0000006b80)=""/38, 0x26}, {&(0x7f0000006bc0)=""/226, 0xe2}], 0x6, &(0x7f0000006d40)=""/125, 0x7d}, 0x8}], 0x9, 0x0, 0x0) 16:22:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000004070470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:05 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000884770470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xa80}], 0x1}}], 0x1, 0x0, 0x0) 16:22:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:05 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000884870470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1588.338455][T15960] XFS (loop3): Invalid superblock magic number 16:22:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) [ 1588.772565][T15992] XFS (loop3): Invalid superblock magic number 16:22:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1008}], 0x1}}], 0x1, 0x0, 0x0) 16:22:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:05 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000655870470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:05 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x20000039}], 0x1}, 0x0) 16:22:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8041, &(0x7f0000000140)="11dca50d5e0bcfe47bf0700550f43e54ad1fbe90450da3ffb8d3f57ec5c23274a30746ad254e590a9411d6bc173a2e4a2b8f57d670775c687c690ec8d4265e9c806326db740568943e8a2240efcb7f65948028885ce0430b0235dce78ae780831a659d7d7bf25a7e2b3f1756c7f7d4c4f93c4233e1e74048eb575141") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000270470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:06 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x7ffff000}], 0x1}, 0x0) 16:22:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000570470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1589.352957][T16018] XFS (loop3): Invalid superblock magic number 16:22:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) keyctl$KEYCTL_CAPABILITIES(0x5, &(0x7f0000000200)=""/182, 0xb6) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', 'ecb(blowfish)\x00'}, &(0x7f00000000c0)='ecb(blowfish)\x00', 0xe, 0x1) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:06 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0xfffffdef}], 0x1}, 0x0) 16:22:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000670470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 16:22:06 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x2}, 0x0) 16:22:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000a70470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x19da, 0x0, 0x10001, 0xc131}) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f0000000100)={r4, 0x81}) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYRES32=r3, @ANYRESOCT=r4], 0x1b) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:07 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000c70470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1590.289313][T16074] XFS (loop3): Invalid superblock magic number [ 1590.291392][T16092] QAT: Invalid ioctl [ 1590.348793][T16095] QAT: Invalid ioctl [ 1590.647776][T16104] XFS (loop3): Invalid superblock magic number 16:22:07 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x3}, 0x0) 16:22:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xffffffffffffffff}], 0x1}}], 0x1, 0x0, 0x0) 16:22:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f00000000c0)={0x1, "26cb811654c33c30575270084bb89524efffb67daff527c0824dffd6cce542b9", 0x2, 0x1}) 16:22:07 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000001070470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:07 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000004c24b0000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") open(&(0x7f0000000000)='./file0\x00', 0x4100, 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:07 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x4}, 0x0) 16:22:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 16:22:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x8}}], 0x1, 0x0, 0x0) 16:22:08 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000454620000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1591.224186][T16129] XFS (loop3): Invalid superblock magic number 16:22:08 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x8}, 0x0) 16:22:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000100)={0x9}, 0x1) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1591.644183][T16172] XFS (loop3): Invalid superblock magic number 16:22:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x500}}], 0x1, 0x0, 0x0) 16:22:08 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x2c}, 0x0) 16:22:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) readahead(r0, 0x7, 0x9) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f00000000c0)={0x401, 0x7}) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:08 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000004e5650000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:08 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x300}, 0x0) 16:22:08 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470200883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)='ppp0\x00', 0x0, r1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f00000001c0)={0x80000000, 0x7, "4c9f8837f158ff7ab89582dce4d943c8a2a956ebe4900742fe87cbc5edc3be89", 0xd7a4, 0xff, 0x0, 0x4d, 0x4, 0x2, 0x1ff, 0x9, [0x9, 0x5, 0x3, 0x3]}) r3 = accept$alg(r1, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e21, @local}, {0x307}, 0x10, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ipddp0\x00'}) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x8}}], 0x1, 0x0, 0x0) 16:22:09 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0xffffff1f}, 0x0) [ 1592.360550][T16200] XFS (loop3): Invalid superblock magic number [ 1592.717255][T16227] XFS (loop3): Invalid superblock magic number 16:22:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:09 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470400883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x10}}], 0x1, 0x0, 0x0) 16:22:09 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x2}, 0x0) 16:22:09 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470a00883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fff, 0x103000) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) socket$alg(0x26, 0x5, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:10 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x4}, 0x0) 16:22:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x4000}}], 0x1, 0x0, 0x0) 16:22:10 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470f00883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1593.357909][T16254] XFS (loop3): Invalid superblock magic number [ 1593.717535][T16284] XFS (loop3): Invalid superblock magic number 16:22:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000009, 0x8010, r0, 0x8000000) accept$inet(r0, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x100) ioctl$TIOCMGET(r3, 0x5415, &(0x7f00000000c0)) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:10 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xa}, 0x0) 16:22:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x100000}}], 0x1, 0x0, 0x0) 16:22:10 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470476000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) 16:22:11 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xf}, 0x0) 16:22:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x7, 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047000a883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:11 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x60}, 0x0) [ 1594.374015][T16307] XFS (loop3): Invalid superblock magic number 16:22:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x8000000}}], 0x1, 0x0, 0x0) 16:22:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x410002, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000200)=@gcm_128={{0x4ad07fc68a19963c}, "b23c8989867ff0dd", "847b27d58bb50370eb47194eab3d16ca", '-<@+', "6385f61b07fa158e"}, 0x28) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000100)={&(0x7f00000000c0)=[0x10, 0x0, 0x8, 0x0, 0x24000000000, 0x3, 0x8000], 0x7, 0x3ff, 0xd0, 0x1, 0x4, 0x80000001, {0xfff, 0x1, 0x8, 0xa1, 0x8001, 0x7, 0x100, 0x0, 0x5, 0x4, 0x5b, 0x2, 0x5, 0x6, "a4e2ca7e36ef6dc9d21f29489be160d4b7081b0bff2d210f164e15332904ae6c"}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000180)) 16:22:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:11 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x440}, 0x0) 16:22:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047000f883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470477018883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) 16:22:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:12 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xa00}, 0x0) 16:22:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047731a883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1595.340177][T16366] XFS (loop3): Invalid superblock magic number [ 1595.730647][T16393] XFS (loop3): Invalid superblock magic number 16:22:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) ioctl(r0, 0x3ff, &(0x7f00000000c0)="c7014060ddd499297375ba7d64633dbff0638823180b2a5502ad246608b4436735348bd03ece33807a17a78901f393e6a03b4fbe80d51cf42e1c90535c09ce228a12eb47a8725e762378357a03446f9389ffdf984605edf5ab363b1568de30c81eccef2e7b1bc2419486b82c49e9f1b99a6845dfd65e7fd4b99142b1cb1603488992333cb358f9e0b7f9be7cb1d23253b5998caf4db66d0d001849ed1ee4dfe0f6a59bc6ca7c9c5c3030488954b9b9dfc97bdfb2fde987ab6a60577bbdbb16") r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x8dffffff}}], 0x1, 0x0, 0x0) 16:22:12 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xf00}, 0x0) 16:22:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470473a1b883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470471b3a883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:12 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x3f00}, 0x0) 16:22:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 16:22:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xf0ffffff}}], 0x1, 0x0, 0x0) 16:22:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) [ 1596.309199][T16418] XFS (loop3): Invalid superblock magic number [ 1596.651089][T16449] XFS (loop3): Invalid superblock magic number 16:22:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xffffff8d}}], 0x1, 0x0, 0x0) 16:22:13 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047003f883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:13 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x4000}, 0x0) 16:22:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 16:22:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) write(r2, &(0x7f00000000c0)="0c496f23e72c4ffe2f71982a7d3555235ad22fc79801bbf96f633ff8e46462810cd85cefda5e13983ad809bd9fcefd75661db0a2530ed262cd2ea820c7853adb01eedfd46a7bb964a96a8b662d85136281abdba626915fa51fd540ad717e7b65e84f115d738e39fd7c1d6a50b0f55dd0dc3f560a2c93e50c896900b72bf5aa52e8306848f784273f59c56987b171db67224cec6f076cb73a1176484aa51f196e65138d94a19b7b3bb8c9b74f37a97388a61707b455ef", 0xb6) 16:22:13 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470040883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:13 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x4004}, 0x0) 16:22:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x100) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) 16:22:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffff0}}], 0x1, 0x0, 0x0) 16:22:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 16:22:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470060883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1597.274549][T16475] XFS (loop3): Invalid superblock magic number [ 1597.644601][T16507] XFS (loop3): Invalid superblock magic number 16:22:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:14 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x6000}, 0x0) 16:22:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x10000000000000}}], 0x1, 0x0, 0x0) 16:22:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:22:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1}, 0x10000}], 0x1, 0x0, 0x0) 16:22:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470471870883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:14 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x34000}, 0x0) 16:22:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470471a73883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000000c0)={0x7, 0x9, 0x30, 0x0, 0x0, [], [], [], 0x4, 0x8000}) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = getuid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="5897b45cdcc844286f320ec57b4a167bc2cb5a1300210ef5c39f947f1c3a8f795e59f20479236b184e41a394ca1df76d30a2742b0d2da2ceb9f0e4acaf2cb9b21097939c082c8982f1233f8055a7a806f8914b653fd43ca9c1c21d5bb72cae6782613b16c55b21a902aa5b7647dfee145e5bd29c745050fbd8dd3018eb8d108f002ca6f7a7acc45e951e15468c8a119273245c5a1a", 0x95, 0x4}], 0x4000, &(0x7f00000003c0)={[{@dioread_lock='dioread_lock'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fowner_gt={'fowner>', r3}}, {@subj_user={'subj_user', 0x3d, '{'}}]}) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:22:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) 16:22:15 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x400300}, 0x0) [ 1598.261354][T16537] XFS (loop3): Invalid superblock magic number [ 1598.268824][T16547] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1598.680038][T16566] XFS (loop3): Invalid superblock magic number 16:22:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:15 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470002883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x800000000000000}}], 0x1, 0x0, 0x0) 16:22:15 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x1000000}, 0x0) 16:22:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8000000}, 0xc) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000140)=@dstopts={0x32, 0x8, [], [@jumbo, @pad1, @calipso={0x7, 0x8, {0x200, 0x0, 0xbb5b, 0xffff}}, @calipso={0x7, 0x30, {0x7ff, 0xa, 0x5, 0x20, [0x1, 0x0, 0x1ff, 0x4, 0x70b08dcc]}}]}, 0x50) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$P9_RWALK(r2, &(0x7f0000000100)={0x30, 0x6f, 0x1, {0x3, [{0x1, 0x0, 0x1}, {0x20, 0x2, 0x7}, {0x2, 0x1, 0x6}]}}, 0x30) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:22:15 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470004883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:16 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x2000000}, 0x0) 16:22:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) 16:22:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x404000, 0x0) write$9p(r3, &(0x7f0000000140)="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", 0xfb) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80800) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) write$P9_RLINK(r2, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:16 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x4000000}, 0x0) [ 1599.331956][T16590] XFS (loop3): Invalid superblock magic number 16:22:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:16 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047000a883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x8000000000000000}}], 0x1, 0x0, 0x0) 16:22:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000240)="11cbc30d5e0bcfe47be7aa07066dc8050000437c000000959354cd5ea8aa209f2ed17d5709ce70") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x102) setsockopt$packet_buf(r3, 0x107, 0x7, &(0x7f0000000140)="c2fbc9e1a05e5a7375d38fa0e47470e5d003617f5e64020fc35b6f65a77a5e5d3e0b0411946834b8c8a1dcc7604344ef41d18b04d8bb03890b73053f9c37e3597cf4af10115776c5a2810c7d1e53fd2f6c9f45bbf09a0ac5a2a84971782384901d25c737f4de2e3b6833d7abf5ef5f173ee5b8e27800a927d813fd34d2", 0x7d) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r3, 0xc040564b, &(0x7f00000000c0)={0x1ff, 0x0, 0x3017, 0x1f81a14f, 0x8000, {0x14, 0x9}, 0x1}) 16:22:16 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xa000000}, 0x0) 16:22:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:16 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xf000000}, 0x0) 16:22:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) 16:22:16 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047000f883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = dup3(r0, r0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), 0x10) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1600.202346][T16643] XFS (loop3): Invalid superblock magic number [ 1600.588953][T16677] XFS (loop3): Invalid superblock magic number 16:22:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0, 0x0) 16:22:17 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470060883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:17 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x3f000000}, 0x0) 16:22:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:22:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) io_setup(0x5, &(0x7f00000001c0)=0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x80000, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x100, 0x0) io_submit(r2, 0x2, &(0x7f0000000540)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x1be, r1, &(0x7f0000000200)="c5f8e54a056c106ecc5a9dd8bdc3a259fb0f2c6f5432bbdd7be5bed7ab94a60f0a2f7475d8c5d0c502e799573eb3eb7ed33780c1fd4712f7dbd4c4b9b0edf55c7bcd99696c84667c7353019789b0b4f0dbe07a04d1b42024777043a56b41b1c0b31a0ee95adc155e97f08e91e67f14ecff3c045d9faa9a3c4f4e8affa92393de3e289f63d792117dfd138cc1e541a66eb7f9e6a6945cad7255be95f5ecd9310ed409d47004962df462c1ea7c8345e72cfca7", 0xb2, 0x1, 0x0, 0x3, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x5, r1, &(0x7f00000003c0)="40753330e8f6ef6e438df210fc7279a53a3a1a9a3a6180db89f42205df4c39e7f9ff843d9e72a1fe0b9c39f0769fca9fe4c5b6d4942f275ff6e354354cd50e8019d128480acdfd5a6c7b7c3c3aa666a31105a6b1e21d64d78e1c203465fe967f3ea225f88f2eeac4973f4bb384a8cbb325d48b46817358a14fa940574f45ab1f8e3a7e41c79a799db0224d3e3f661b0fa3b5050487b877c964dc928e39452a0e1791996d9a2410cfc9590c47d7247ddfdf1d4946d8052fea1912d90a76185d462bae9fb20deedb0059660d45a4a0f3ff60f5054d33d8a7ead311a1eebd38b1f046ea320c43146efed7b45ecfb849d9cc6b5b7d68578c", 0xf6, 0x8000, 0x0, 0x1f725ebd1c1c0482, r4}]) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000640)=r5) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) lseek(r1, 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200400, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80, 0x0) ioctl$KVM_IOEVENTFD(r6, 0x4040ae79, &(0x7f0000000140)={0x2000, &(0x7f00000000c0), 0x4, r7, 0xa}) r8 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r8, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000180)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x802, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(r8, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:17 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047000088379539c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) [ 1600.934824][T16695] Unknown ioctl 35075 16:22:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:22:17 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x40000000}, 0x0) [ 1600.994863][T16695] Unknown ioctl 35075 16:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) accept4$alg(r1, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:18 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f08000000047047000088379550c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1601.194528][T16703] XFS (loop3): Invalid superblock magic number [ 1601.511494][T16733] XFS (loop3): Invalid superblock magic number 16:22:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:22:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) 16:22:18 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x40040000}, 0x0) 16:22:18 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b145df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @initdev, @empty}, &(0x7f0000000200)=0xc) r4 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0xb4f3, 0x220000) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xb, 0xa, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x0, 0x3, 0x2, 0xb, 0xffffffffffffffff, 0xffffffffffffffff}, @generic={0x9, 0x8, 0x5, 0x3, 0xffff}, @alu={0x7, 0x0, 0xf, 0x3, 0x6, 0xffffffffffffffff, 0xfffffffffffffffc}, @ldst={0x2, 0x3, 0x0, 0x7, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7fffffff}, @jmp={0x5, 0x100, 0x1, 0x1, 0x0, 0x4, 0x10}]}, &(0x7f0000000000)='\x00\x00\x00\x00', 0xfffffffffffffffb, 0x57, &(0x7f0000000440)=""/87, 0x41f00, 0x2, [], r3, 0x17, r4, 0x8, &(0x7f0000000280)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x1, 0x7, 0x6}, 0x10}, 0x70) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:18 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5020a00000000000000", 0x39}], 0x1}, 0x0) 16:22:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:22:18 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x60000000}, 0x0) 16:22:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x10}}], 0x1, 0x0, 0x0) 16:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 16:22:18 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5040a00000000000000", 0x39}], 0x1}, 0x0) [ 1602.147833][T16759] XFS (loop3): Invalid superblock magic number [ 1602.580420][T16788] XFS (loop3): Invalid superblock magic number 16:22:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:19 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x9effffff}, 0x0) 16:22:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x4000}}], 0x1, 0x0, 0x0) 16:22:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:22:19 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df50a0a00000000000000", 0x39}], 0x1}, 0x0) 16:22:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x242000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x6f, "85b0569266bc28fc766440d21a9a046b091219cc68be361d89e77681155b57167680cec1519db8ac798a1f601e733a3a0a45f6cd648d3c6b2bff578d666d159f9f4d090ff158b00339c896c605744d2c47889b510d7c5f76f300461d8d6fb5d027c99f819490c2ff24e83faf3ac342"}, &(0x7f0000000140)=0x77) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x3f, 0x6, 0xfffffffffffffffc, 0x6, 0x5}, 0x14) r4 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:19 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df50f0a00000000000000", 0x39}], 0x1}, 0x0) 16:22:19 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xefffffff}, 0x0) 16:22:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x100000}}], 0x1, 0x0, 0x0) 16:22:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x20000000000000, 0x4000) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000001c0)) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000100)="1af7d88b97d640935c07a9d991a4472cdddc4cbb7b96118ebb5937e6aa70b50d8f2ff57e9d556a3842bd212d2cde7480b6abc77408f9f46e1d0a2a594923bb2c2c8955ced31c3be0778ae4a301267a0145977c91e997c39484cc5b8415e15f13023856e34f5772f09334c90f642939c996179f8772c79aa2df6d88fcea16cb80078d53feabe940d355579124a218d969d5bf72172409604a20e892f7587c63a423c31d7bfc91552136fda8a4062c7949c2304d6e907cba") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:22:20 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5600a00000000000000", 0x39}], 0x1}, 0x0) [ 1603.205717][T16818] XFS (loop3): Invalid superblock magic number [ 1603.579973][T16846] XFS (loop3): Invalid superblock magic number 16:22:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) 16:22:20 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xf0ffffff}, 0x0) 16:22:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0xffffffffffffffb3) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="f0979be9975f83499726e5f53e529ea4ac", 0x337) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r2}, {r2}], 0x2, 0x0, 0x0, 0x0) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000180)) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:20 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000c00000000000000", 0x39}], 0x1}, 0x0) 16:22:20 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5004000000000000000", 0x39}], 0x1}, 0x0) 16:22:20 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xffffff7f}, 0x0) 16:22:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x8000000}}], 0x1, 0x0, 0x0) 16:22:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0fff2000000b7060000000000812d64001704000001000a40b7040000004ec90361419a7f240000008503000027000000b7400000000000009500"/112], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f00000001c0)={0x1, 0x2, 0x2, 0x80}) r4 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000540)=ANY=[@ANYRESOCT=r4, @ANYRES64=r0, @ANYRESDEC=0x0, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYRESDEC=r1, @ANYRESHEX=r4, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYPTR, @ANYRES32=r0, @ANYPTR, @ANYBLOB="54e3ec525ea4ba6b7f599250065134e2a5de1a04fba10bb467333d1757ab1372c5cce56035ab89d89c8943277d842f514ff3828d01ade8e787f225a41b6a6d4c645d34b877a396874dd0e624114e84d9e1b6f4b52ccc539793d07cd426921237857418c1fccdecb8943ca384a1de427aebe5c0e344931658360aeb70b7cca9b04c8319e3986b08e6fd13fb608b60ca6725959bc466668af1ae417c39be8b33"], @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r0, @ANYRES16=r2, @ANYBLOB="0d29ac9c1560bbc9a5c9bbe89e516577122ec04eb562b4bed35e0ea83ff7b7aa57dbadf027961346fa88c97faf4b196ac57d2a809a288d2f0dda64cbdb7eaebfc9be716f951b003b95683f55ac067bbc80ce6e97810275c5f110387233680a6ea14c4a1b58f54c5213d775aab2dc73c27e616cfbadee203682833e4cd73e3dd1ad580a425dcef7f93f0da5f80e5808dc983289a6d7d1e4749d7c1c510289ce5434036303e4a77f124576f4d5cdd13adcce8c6634b59f", @ANYRESOCT=r0, @ANYRES64=r1]], @ANYRES32=r1], 0x3f) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:21 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xffffff9e}, 0x0) [ 1604.089768][T16870] XFS (loop3): Invalid superblock magic number [ 1604.491106][T16904] XFS (loop3): Invalid superblock magic number 16:22:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:21 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000c00000000000000", 0x39}], 0x1}, 0x0) 16:22:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f00000000c0)={0x0, 0x0, @ioapic}) 16:22:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) 16:22:21 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xffffffef}, 0x0) 16:22:21 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xfffffff0}, 0x0) 16:22:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x8dffffff}}], 0x1, 0x0, 0x0) 16:22:21 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a02000000000000", 0x39}], 0x1}, 0x0) 16:22:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) 16:22:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xf0ffffff}}], 0x1, 0x0, 0x0) 16:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRES64=r2, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES16=r0, @ANYPTR64, @ANYRESHEX=0x0, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64=0x0, @ANYPTR64], @ANYRESDEC=r1], @ANYBLOB="6a8139b041aa2008dc2d3d4ccb0072c1b3db58c1e75334b396e44db2813056d259c096636a5d813c3f7b83ca5c0a7d7ac91551684df6da9cea7d28acb0f2bb0edcf77977b39dd43c8d31ab14163ecc78a8697e6c66e7024ea045595e2ae3b8276c93d485ee855d4561f0991d6e0d010aa4135a37", @ANYRES64=r2], 0xfffffcc3) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1605.066683][T16927] XFS (loop3): Invalid superblock magic number [ 1605.450711][T16962] XFS (loop3): Invalid superblock magic number 16:22:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) accept$alg(r1, 0x0, 0x0) 16:22:22 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a04000000000000", 0x39}], 0x1}, 0x0) 16:22:22 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x40030000000000}, 0x0) 16:22:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff8d}}], 0x1, 0x0, 0x0) 16:22:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02012dbd7200fddbdf250a00000008000400ffff0000080005009930927bd708d99e8d4204511f900de17e01000048000300080007004e20000008000500000003ff14000200626476300000000000000000000800070000080003936dcf72b74e63887f7f220000000000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4010}, 0x10) r4 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:22 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x100000000000000}, 0x0) 16:22:22 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0a000000000000", 0x39}], 0x1}, 0x0) 16:22:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xfffffff0}}], 0x1, 0x0, 0x0) 16:22:22 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0f000000000000", 0x39}], 0x1}, 0x0) [ 1606.049043][T16989] XFS (loop3): Invalid superblock magic number 16:22:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:23 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x200000000000000}, 0x0) 16:22:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x10000000000000}}], 0x1, 0x0, 0x0) 16:22:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:23 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a60000000000000", 0x39}], 0x1}, 0x0) 16:22:23 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) fcntl$getown(r0, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000001a40)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @broadcast}, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/200}, {&(0x7f0000000240)=""/150}, {&(0x7f00000003c0)=""/158}, {&(0x7f0000000480)=""/81}], 0x0, &(0x7f0000000500)=""/131}, 0x8001}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)=""/56}, {&(0x7f0000000600)=""/2}]}, 0xffff}, {{&(0x7f0000000680)=@isdn, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/145}], 0x0, &(0x7f0000000800)=""/135}, 0x8001}, {{&(0x7f00000008c0)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/210}, {&(0x7f0000000a40)=""/63}, {&(0x7f0000000a80)=""/241}, {&(0x7f0000000b80)=""/95}, {&(0x7f0000000c00)=""/104}, {&(0x7f0000000c80)=""/64}, {&(0x7f0000000cc0)=""/181}], 0x0, &(0x7f0000000e00)=""/151}, 0x1}, {{&(0x7f0000000ec0)=@nl=@proc, 0x0, &(0x7f0000001300)=[{&(0x7f0000000f40)=""/150}, {&(0x7f0000001000)=""/34}, {&(0x7f0000001040)=""/79}, {&(0x7f00000010c0)=""/199}, {&(0x7f00000011c0)=""/33}, {&(0x7f0000001200)=""/249}], 0x0, &(0x7f0000001380)=""/138}, 0x80}, {{&(0x7f0000001440), 0x0, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/52}, {&(0x7f0000001500)=""/187}], 0x0, &(0x7f0000001600)=""/85}, 0x5}, {{&(0x7f0000001680)=@hci, 0x0, &(0x7f0000001940)=[{&(0x7f0000001700)=""/62}, {&(0x7f0000001740)=""/19}, {&(0x7f0000001780)=""/50}, {&(0x7f00000017c0)=""/10}, {&(0x7f0000001800)=""/88}, {&(0x7f0000001880)=""/152}], 0x0, &(0x7f00000019c0)=""/72}, 0x8}], 0xa3, 0x6, 0x0) 16:22:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:23 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000a0000000000", 0x39}], 0x1}, 0x0) 16:22:23 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x400000000000000}, 0x0) 16:22:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3ff, 0xa00) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x10000, 0x2, 0x8, 0xea98, 0x7, 0xd8, 0x2, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x4}, 0x8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000580)=[0xffffffffffffffff]) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="02000000010003000000000002000300", @ANYRES32=r5, @ANYBLOB="040000000000000008000100", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=r7, @ANYBLOB="08b4fdd8494209c37f3f6c5433fafad04eae1af1b5c7799f1f356092913c4e88388c7edafbbcba49946b71d9ac28036ccffbba83af21a3ddb3a959015ce4e0faaa07b901", @ANYRES32=r8, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r10, @ANYBLOB="08000600", @ANYRES32=r11, @ANYBLOB="10000600000000002000020000000000"], 0x5c, 0x2) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) 16:22:23 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xa00000000000000}, 0x0) [ 1606.949941][T17042] XFS (loop3): Invalid superblock magic number 16:22:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:24 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000f0000000000", 0x39}], 0x1}, 0x0) 16:22:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000100)={0x0, 0x1d7, 0x1010, 0x1}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100000000, 0x4) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x800000000000000}}], 0x1, 0x0, 0x0) 16:22:24 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xf00000000000000}, 0x0) 16:22:24 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a70180000000000", 0x39}], 0x1}, 0x0) 16:22:24 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 16:22:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) 16:22:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1607.855941][T17100] XFS (loop3): Invalid superblock magic number 16:22:24 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x4000000000000000}, 0x0) 16:22:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x8000000000000000}}], 0x1, 0x0, 0x0) 16:22:25 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a731a0000000000", 0x39}], 0x1}, 0x0) 16:22:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:25 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x4004000000000000}, 0x0) 16:22:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYBLOB="914314267e7833f0a18b1fd4b825729971c78df7d0"], @ANYRESOCT=r2, @ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRES64=r0, @ANYBLOB="e84e0699976b30d6a15b1a197980b4a16cf407eeb11cc33f0dfaf70aa3acd8e69b84b4ecd0a403a1ee5cd9a4b271dc7f288884c60c4c3a32b38decceb7c133876736376570d0badb367792e3b00eea43e051e2bfd271f75d8bf91e010f967b2230fb1dd47ebfa5b75c10a8c8c2883faa9982793cbea10f3f311c88206f9a794dbe8133ae50ddd133de54c363490e0c4f3e8addeddf6dbbfd88a3888df7e769f49378bd8e239a851f21be8ec11f0e0c24b35874566ac7ab7a5b7e892cdab7dd1c0389658445522aab0f2e27041f392defb3da0b11c801f76cbfcd2e4d6f7cf65871d1bf047da1363dde3bcce285d1045b63752dda", @ANYRESDEC=r0, @ANYRESOCT, @ANYRESHEX=r2], 0x190) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:25 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x6000000000000000}, 0x0) 16:22:25 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a3a1b0000000000", 0x39}], 0x1}, 0x0) 16:22:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) 16:22:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$P9_RLERROR(r0, &(0x7f0000000000)={0x9, 0x7, 0x2}, 0x9) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x401, 0x12001) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000240)) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x400840, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r5 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x7, 0x101000) ioctl$TIOCGPTLCK(r5, 0x80045439, &(0x7f00000002c0)) r6 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) syz_open_pts(r6, 0x800) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000004700), 0x38a}}], 0x400000000000315, 0x0, 0x0) 16:22:25 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x8000000000000000}, 0x0) [ 1608.764248][T17172] XFS (loop3): Invalid superblock magic number 16:22:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:26 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a1b3a0000000000", 0x39}], 0x1}, 0x0) 16:22:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0, 0x0) 16:22:26 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 16:22:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) 16:22:26 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a003f0000000000", 0x39}], 0x1}, 0x0) 16:22:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = fsmount(0xffffffffffffffff, 0x1, 0x2) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) 16:22:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:26 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xefffffff00000000}, 0x0) [ 1609.653586][T17219] XFS (loop3): Invalid superblock magic number 16:22:26 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00400000000000", 0x39}], 0x1}, 0x0) 16:22:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x2002, 0x160) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000140)={0xffff, {{0x2, 0x4e21, @local}}, 0x1, 0x2, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, 0x190) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="a2ec750f11b2665edd083934b29f1aa6a7772bee2c7b5cc5ee6132e49ba8596d340d2cab53b61af5ffcb1ddc9dda23b4"], 0xb88d86ae75a35f1a) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r5, 0xaf02, 0x0) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:27 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:27 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 16:22:27 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00600000000000", 0x39}], 0x1}, 0x0) 16:22:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:27 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a18700000000000", 0x39}], 0x1}, 0x0) 16:22:27 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:27 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 16:22:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x9) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000000c0)={0x7, 0x1000}) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1610.560693][T17282] XFS (loop3): Invalid superblock magic number 16:22:27 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 16:22:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:28 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a1a730000000000", 0x39}], 0x1}, 0x0) 16:22:28 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000680)="ab2d49ec4c1858204a2f6b8764790f412c935823492b8ac4bce15fae295f47050914d3ba4df10f9b43fff03e3be779e0e9f5d283dd66c1cc954452cc260335fe7a86abb1cb3029aaeff4b5ff03eeb518a15a5fbf48318d3a2a07cb74f33154d2e439f5b7a61a16cd9198e5baf5b5d977fa0156b46d72c570355a", 0x57cb959f6d15eead) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000480)={0x0, 0x5f575b5f, 0x7fff, 0x7, 0x3, @discrete={0x10001, 0x80000001}}) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r1], 0x17) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x5d376b1f819874e3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xcc, r4, 0xc00, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7fff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xa2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8c7b}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xd0c}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x59}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="32ce8f49096ce5034fc334c152ef06d7"}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40001}, 0x20000000) bind$alg(r1, &(0x7f00000005c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(blowfish)\x00'}, 0x58) getsockname$tipc(r3, &(0x7f00000002c0)=@name, &(0x7f0000000300)=0x10) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000400)) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000500)="9868bfeedcef9c7246109386d0c5358e9833da3298d86f39dd3e23ea996698e320b8878a8ed3566ecd66c29a3e4298806f8020cdaf13d42761da330598f77e4c0c443220c327aeeabc96a5c339979fbcd24ec1363b43d9e04aaf7a6217989492023de8a85ec923867eac345a699850cc72d5a36506004adfad28ab9fb28a8f07ba36389a81a2e9") 16:22:28 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x2}, 0x0) 16:22:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:28 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00400300000000", 0x39}], 0x1}, 0x0) 16:22:28 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:28 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x4}, 0x0) 16:22:28 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00034000000000", 0x39}], 0x1}, 0x0) 16:22:28 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xa}, 0x0) [ 1611.499375][T17339] XFS (loop3): Invalid superblock magic number 16:22:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:28 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:28 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xf}, 0x0) 16:22:28 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000001000000", 0x39}], 0x1}, 0x0) 16:22:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f00000000c0)) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xffffffffffffff29}}], 0x1, 0x0, 0x0) 16:22:29 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000002000000", 0x39}], 0x1}, 0x0) 16:22:29 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x60}, 0x0) 16:22:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f00000000c0)) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:29 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x440}, 0x0) [ 1612.411454][T17403] XFS (loop3): Invalid superblock magic number 16:22:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:29 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000004000000", 0x39}], 0x1}, 0x0) 16:22:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:29 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2843, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0xea8950978a29007b, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000280)={0x10d000, &(0x7f0000000200), 0x2, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") read(r2, &(0x7f0000000000)=""/35, 0x23) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300)="ab553fec", 0x4) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r5, 0x80605414, &(0x7f0000000100)=""/170) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xbe, @mcast1, 0x7fffffff}, r6}}, 0x30) 16:22:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:29 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 16:22:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:30 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000a000000", 0x39}], 0x1}, 0x0) 16:22:30 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 16:22:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:30 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) [ 1613.336287][T17463] XFS (loop3): Invalid superblock magic number [ 1613.730065][T17488] XFS (loop3): Invalid superblock magic number 16:22:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:30 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000f000000", 0x39}], 0x1}, 0x0) 16:22:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:30 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x4000}, 0x0) 16:22:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x10800) write$P9_RUNLINKAT(r2, &(0x7f00000000c0)={0x7, 0x4d, 0x2}, 0x7) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x88402, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:31 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00001b3a000000", 0x39}], 0x1}, 0x0) 16:22:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:31 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x4004}, 0x0) 16:22:31 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000003f000000", 0x39}], 0x1}, 0x0) [ 1614.245676][T17515] XFS (loop3): Invalid superblock magic number [ 1614.640526][T17548] XFS (loop3): Invalid superblock magic number 16:22:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:31 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 16:22:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="0226aa8e61ed6a0655d27090515b93d06b18b722f7719b2d337b44a6245d07131806467b121d7fd94c901fef4b1996be49acc01f51796f4b564b417d0da71748d30e2c597e63bd0cffc4139d1299deb27b6ca3cf736a5a59f4bfadea6ae97f289970143e18f1e6b8f900f1", @ANYRESDEC=r1, @ANYRES32=r2, @ANYRESOCT=r2, @ANYRESHEX=0x0, @ANYRES32=r2, @ANYRESOCT, @ANYRES32=r0], @ANYRESHEX=r2, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES32=r0, @ANYRESDEC=r1], 0x5e) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x125c}], 0x1}}], 0x1, 0x0, 0x0) 16:22:31 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000040000000", 0x39}], 0x1}, 0x0) 16:22:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:31 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 16:22:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000000)=@get={0x1, &(0x7f00000000c0)=""/217, 0x77}) 16:22:31 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000060000000", 0x39}], 0x1}, 0x0) 16:22:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) [ 1615.155807][T17572] XFS (loop3): Invalid superblock magic number 16:22:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:32 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 16:22:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setrlimit(0x3, &(0x7f0000000000)={0x7, 0x95d}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:32 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00001870000000", 0x39}], 0x1}, 0x0) 16:22:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:32 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00001a73000000", 0x39}], 0x1}, 0x0) 16:22:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x400, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400000, 0x0) getpeername$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:32 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 16:22:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:32 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000affffff9e000000", 0x39}], 0x1}, 0x0) [ 1616.020149][T17626] XFS (loop3): Invalid superblock magic number [ 1616.438339][T17658] XFS (loop3): Invalid superblock magic number 16:22:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x8) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 16:22:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:33 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000affffffef000000", 0x39}], 0x1}, 0x0) 16:22:33 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 16:22:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:33 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000afffffff0000000", 0x39}], 0x1}, 0x0) 16:22:33 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:22:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001000008913, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xab32) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:33 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a7fffffff000000", 0x39}], 0x1}, 0x0) [ 1617.005469][T17682] XFS (loop3): Invalid superblock magic number [ 1617.382377][T17719] XFS (loop3): Invalid superblock magic number 16:22:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:34 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) 16:22:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:22:34 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a9effffff000000", 0x39}], 0x1}, 0x0) 16:22:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/llc\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$SG_SET_KEEP_ORPHAN(r3, 0x2287, &(0x7f00000000c0)=0x200) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:34 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 16:22:34 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000aefffffff000000", 0x39}], 0x1}, 0x0) 16:22:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x8}], 0x1, 0x0, 0x0) 16:22:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)=""/81, 0x51}, {&(0x7f00000001c0)=""/216, 0xd8}, {&(0x7f00000003c0)=""/161, 0xa1}, {&(0x7f00000002c0)=""/72, 0x48}, {&(0x7f0000000480)=""/146, 0x92}], 0x5, &(0x7f0000000000)=""/3, 0x3}, 0x40000000) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000600)={0x7f, 0xf8e}, 0x2) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000006c0)=0x4) bind$alg(r2, &(0x7f0000000640)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) 16:22:34 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) [ 1617.963582][T17745] XFS (loop3): Invalid superblock magic number [ 1618.327302][T17775] XFS (loop3): Invalid superblock magic number 16:22:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:35 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000af0ffffff000000", 0x39}], 0x1}, 0x0) 16:22:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x10}], 0x1, 0x0, 0x0) 16:22:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10001, 0x101000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}]}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 16:22:35 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x40000000}, 0x0) 16:22:35 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000340", 0x39}], 0x1}, 0x0) 16:22:35 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x40040000}, 0x0) 16:22:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x4000}], 0x1, 0x0, 0x0) 16:22:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) socket$inet6(0xa, 0x8000f, 0xc86f) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ff9000/0x4000)=nil, 0x800, 0x5, 0x8, &(0x7f0000ffb000/0x3000)=nil, 0x2}) 16:22:35 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1618.904318][T17799] XFS (loop3): Invalid superblock magic number [ 1619.319388][T17831] XFS (loop3): Invalid superblock magic number 16:22:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x100000}], 0x1, 0x0, 0x0) 16:22:36 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 16:22:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3ecd0000, 0x64180) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, r0, &(0x7f0000000180)={r2, r1, 0x8}) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:36 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:36 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4c0, 0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x200, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xa, 0xff, @udp='udp:syz0\x00'}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:22:36 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 16:22:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x1000000}], 0x1, 0x0, 0x0) 16:22:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) [ 1620.009202][T17859] XFS (loop3): Invalid superblock magic number [ 1620.388715][T17885] XFS (loop3): Invalid superblock magic number 16:22:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:37 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000140)=""/92, &(0x7f00000001c0)=0x39d) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x1e, 0x4) 16:22:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x8000000}], 0x1, 0x0, 0x0) 16:22:37 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 16:22:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:37 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1620.717857][T17901] QAT: Invalid ioctl 16:22:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x40000000}], 0x1, 0x0, 0x0) 16:22:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x400000) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000000c0)={0x3ff, 0x7, 0xe5fb, 0xf2}, 0x8) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000100)) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000200), 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e23, 0x3ea, @mcast2, 0x100000000}, {0xa, 0x4e22, 0x80000000, @remote, 0x9}, 0x7fffffff, [0x1, 0xfffffffffffffffc, 0x5a4e, 0x1ff, 0xd9, 0x100, 0x7154, 0x2]}, 0x5c) r4 = fcntl$getown(r2, 0x9) migrate_pages(r4, 0x400, &(0x7f0000000200)=0x4, &(0x7f0000000240)=0x10001) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000140)={0x100000000000000, 0x10f001, 0xa48, 0x6, 0x9}) 16:22:37 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 16:22:37 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000001b", 0x39}], 0x1}, 0x0) [ 1621.001250][T17912] XFS (loop3): Invalid superblock magic number 16:22:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:38 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 16:22:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x8dffffff}], 0x1, 0x0, 0x0) 16:22:38 executing program 0: open(0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) r0 = gettid() stat(0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000100)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) pipe(0x0) tgkill(0x0, 0x0, 0x0) tkill(r0, 0x14) 16:22:38 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:38 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0xf0ffffff}], 0x1, 0x0, 0x0) 16:22:38 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 16:22:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, 0x0) [ 1621.813219][T17966] XFS (loop3): Invalid superblock magic number 16:22:38 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1622.239428][T17997] XFS (loop3): Invalid superblock magic number 16:22:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0xffffff8d}], 0x1, 0x0, 0x0) 16:22:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:39 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xffffffef}, 0x0) 16:22:39 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000018", 0x39}], 0x1}, 0x0) 16:22:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x3ffff}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:22:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:39 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000001a", 0x39}], 0x1}, 0x0) 16:22:39 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 16:22:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0xfffffff0}], 0x1, 0x0, 0x0) 16:22:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:39 executing program 0: ioperm(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c00810ce00f80ecdb4cb9f207c804a00d000000880012fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 1622.915093][T18025] XFS (loop3): Invalid superblock magic number [ 1623.016864][T18047] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1623.272081][T18051] XFS (loop3): Invalid superblock magic number 16:22:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:40 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x10000000000000}], 0x1, 0x0, 0x0) 16:22:40 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 16:22:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) 16:22:40 executing program 0: ioperm(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c00810ce00f80ecdb4cb9f207c804a00d000000880012fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 16:22:40 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000ffffff", 0x39}], 0x1}, 0x0) 16:22:40 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 16:22:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) [ 1623.673863][T18068] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. 16:22:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x100000000000000}], 0x1, 0x0, 0x0) 16:22:40 executing program 0: ioperm(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c00810ce00f80ecdb4cb9f207c804a00d000000880012fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 16:22:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) [ 1623.889452][T18077] XFS (loop3): Invalid superblock magic number [ 1623.973936][T18096] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1624.232782][T18104] XFS (loop3): Invalid superblock magic number 16:22:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:41 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000ffffff", 0x39}], 0x1}, 0x0) 16:22:41 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 16:22:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x800000000000000}], 0x1, 0x0, 0x0) 16:22:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x200, 0x4e200) 16:22:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 16:22:41 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000ffffff", 0x39}], 0x1}, 0x0) 16:22:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_map={0x1ff}}) 16:22:41 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 16:22:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x4000000000000000}], 0x1, 0x0, 0x0) 16:22:41 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x20, 0x20, 0xf29}, 0x20}}, 0x0) [ 1624.845063][T18128] XFS (loop3): Invalid superblock magic number 16:22:41 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) [ 1624.922823][T18153] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1625.000954][T18158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:22:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:42 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000007fffff", 0x39}], 0x1}, 0x0) 16:22:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x8000000000000000}], 0x1, 0x0, 0x0) 16:22:42 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) write$P9_ROPEN(r0, &(0x7f0000000000)={0x18}, 0x18) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 16:22:42 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) syz_open_procfs(0x0, 0x0) r3 = syz_open_dev$mouse(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x400000000000000, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e21, 0xffffffffffffffde, @dev={0xfe, 0x80, [], 0x26}}, {0xa, 0x4e21, 0x7ff, @remote, 0xfffffffffffff800}, 0x8, [0x0, 0x0, 0x1, 0x45, 0x338, 0xaa5e, 0x100000000, 0x9]}, 0x5c) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) readlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000400)=""/124, 0x7c) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') sendfile(r0, r4, 0x0, 0xfe) 16:22:42 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 16:22:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x8dffffff00000000}], 0x1, 0x0, 0x0) [ 1625.570070][ T26] audit: type=1800 audit(1564071762.435:48): pid=18185 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=18037 res=0 16:22:42 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000ffffff", 0x39}], 0x1}, 0x0) 16:22:42 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) [ 1625.670659][ T26] audit: type=1804 audit(1564071762.435:49): pid=18185 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir918151497/syzkaller.wOOiKo/2515/file0" dev="sda1" ino=18037 res=1 16:22:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0xf0ffffff00000000}], 0x1, 0x0, 0x0) 16:22:42 executing program 1: socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) 16:22:42 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00020000000000", 0x39}], 0x1}, 0x0) [ 1625.859282][T18197] XFS (loop3): Invalid superblock magic number [ 1626.301540][T18230] XFS (loop3): Invalid superblock magic number 16:22:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:43 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) 16:22:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0xffffffff00000000}], 0x1, 0x0, 0x0) 16:22:43 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000140)={&(0x7f0000000040)=""/244, 0x0, 0x1000}, 0x18) 16:22:43 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00040000000000", 0x39}], 0x1}, 0x0) 16:22:43 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x2) madvise(&(0x7f000085e000/0x4000)=nil, 0x4000, 0x0) 16:22:43 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x4004000000000000}, 0x0) 16:22:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:43 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000a0000000000", 0x39}], 0x1}, 0x0) 16:22:43 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x44, 0x0, 0x210, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}]}, 0x44}}, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) get_mempolicy(0x0, &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) [ 1626.904246][T18253] XFS (loop3): Invalid superblock magic number 16:22:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:43 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000f0000000000", 0x39}], 0x1}, 0x0) 16:22:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:44 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) 16:22:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:44 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00600000000000", 0x39}], 0x1}, 0x0) 16:22:44 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000a00000000", 0x39}], 0x1}, 0x0) [ 1627.747438][T18307] XFS (loop3): Invalid superblock magic number 16:22:44 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x2) madvise(&(0x7f000085e000/0x4000)=nil, 0x4000, 0x0) 16:22:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:44 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x8000000000000000}, 0x0) 16:22:44 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000f00000000", 0x39}], 0x1}, 0x0) 16:22:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:44 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 16:22:44 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00701800000000", 0x39}], 0x1}, 0x0) 16:22:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:45 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00731a00000000", 0x39}], 0x1}, 0x0) 16:22:45 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xefffffff00000000}, 0x0) [ 1628.507029][T18363] XFS (loop3): Invalid superblock magic number 16:22:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) 16:22:45 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a003a1b00000000", 0x39}], 0x1}, 0x0) 16:22:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:45 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 16:22:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:45 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a001b3a00000000", 0x39}], 0x1}, 0x0) 16:22:45 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 16:22:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:45 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00003f00000000", 0x39}], 0x1}, 0x0) 16:22:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) 16:22:46 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 16:22:46 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00004000000000", 0x39}], 0x1}, 0x0) 16:22:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) 16:22:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) [ 1629.418330][T18423] XFS (loop3): Invalid superblock magic number 16:22:46 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:46 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00006000000000", 0x39}], 0x1}, 0x0) 16:22:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) 16:22:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:46 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:46 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00187000000000", 0x39}], 0x1}, 0x0) 16:22:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:46 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a001a7300000000", 0x39}], 0x1}, 0x0) 16:22:46 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000400)) 16:22:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:47 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00004003000000", 0x39}], 0x1}, 0x0) [ 1630.165679][T18481] XFS (loop3): Invalid superblock magic number [ 1630.539815][T18511] XFS (loop3): Invalid superblock magic number 16:22:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:47 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000400)) 16:22:47 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000340000000", 0x39}], 0x1}, 0x0) 16:22:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:47 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:47 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000010000", 0x39}], 0x1}, 0x0) 16:22:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000400)) 16:22:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:48 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000020000", 0x39}], 0x1}, 0x0) [ 1631.102602][T18535] XFS (loop3): Invalid superblock magic number [ 1631.492327][T18566] XFS (loop3): Invalid superblock magic number 16:22:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:48 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:48 executing program 1: r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:48 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000040000", 0x39}], 0x1}, 0x0) 16:22:48 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000a0000", 0x39}], 0x1}, 0x0) 16:22:48 executing program 1: r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:48 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 1632.132052][T18590] XFS (loop3): Invalid superblock magic number [ 1632.481222][T18624] XFS (loop3): Invalid superblock magic number 16:22:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:49 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000f0000", 0x39}], 0x1}, 0x0) 16:22:49 executing program 1: r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:49 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:49 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000001b3a0000", 0x39}], 0x1}, 0x0) 16:22:49 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 16:22:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) [ 1633.056177][T18646] XFS (loop3): Invalid superblock magic number [ 1633.469259][T18675] XFS (loop3): Invalid superblock magic number 16:22:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:50 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000003f0000", 0x39}], 0x1}, 0x0) 16:22:50 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 16:22:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:50 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:50 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:50 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:22:50 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000400000", 0x39}], 0x1}, 0x0) 16:22:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) [ 1634.064907][T18705] XFS (loop3): Invalid superblock magic number [ 1634.411645][T18732] XFS (loop3): Invalid superblock magic number 16:22:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:51 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:51 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:51 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000600000", 0x39}], 0x1}, 0x0) 16:22:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x8, 0x0) 16:22:51 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000018700000", 0x39}], 0x1}, 0x0) 16:22:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:51 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x10, 0x0) 16:22:51 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:51 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000001a730000", 0x39}], 0x1}, 0x0) [ 1635.022892][T18755] XFS (loop3): Invalid superblock magic number [ 1635.401071][T18785] XFS (loop3): Invalid superblock magic number 16:22:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:52 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:52 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:52 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00ffffff9e0000", 0x39}], 0x1}, 0x0) 16:22:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x4000, 0x0) 16:22:52 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00ffffffef0000", 0x39}], 0x1}, 0x0) 16:22:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:52 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:52 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x100000, 0x0) 16:22:52 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00fffffff00000", 0x39}], 0x1}, 0x0) [ 1636.048377][T18813] XFS (loop3): Invalid superblock magic number [ 1636.420648][T18839] XFS (loop3): Invalid superblock magic number 16:22:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, &(0x7f0000000400)) 16:22:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x1000000, 0x0) 16:22:53 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:53 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a007fffffff0000", 0x39}], 0x1}, 0x0) 16:22:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:53 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a009effffff0000", 0x39}], 0x1}, 0x0) 16:22:53 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) capget(0x0, &(0x7f0000000400)) 16:22:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x8000000, 0x0) 16:22:53 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1637.030025][T18868] XFS (loop3): Invalid superblock magic number [ 1637.419297][T18892] XFS (loop3): Invalid superblock magic number 16:22:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x40000000, 0x0) 16:22:54 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00efffffff0000", 0x39}], 0x1}, 0x0) 16:22:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) capget(0x0, &(0x7f0000000400)) 16:22:54 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:54 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00f0ffffff0000", 0x39}], 0x1}, 0x0) 16:22:54 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x8dffffff, 0x0) 16:22:54 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) capget(0x0, &(0x7f0000000400)) 16:22:54 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) [ 1638.058731][T18915] XFS (loop3): Invalid superblock magic number 16:22:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:55 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:55 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000003", 0x39}], 0x1}, 0x0) 16:22:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0xf0ffffff, 0x0) 16:22:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x0, r0}, &(0x7f0000000400)) 16:22:55 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:55 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0xffffff8d, 0x0) 16:22:55 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x0, r0}, &(0x7f0000000400)) 16:22:56 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1639.186621][T18969] XFS (loop3): Invalid superblock magic number 16:22:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0xfffffff0, 0x0) 16:22:56 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x0, r0}, &(0x7f0000000400)) 16:22:56 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:56 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x10000000000000, 0x0) 16:22:56 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000400)) [ 1640.017238][T19023] XFS (loop3): Invalid superblock magic number 16:22:57 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:57 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x100000000000000, 0x0) 16:22:57 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000400)) 16:22:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x800000000000000, 0x0) 16:22:57 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:57 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000400)) 16:22:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) [ 1640.920465][T19078] XFS (loop3): Invalid superblock magic number 16:22:57 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1641.327613][T19108] XFS (loop3): Invalid superblock magic number 16:22:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x4000000000000000, 0x0) 16:22:58 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, 0x0) 16:22:58 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:58 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x8000000000000000, 0x0) 16:22:58 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, 0x0) [ 1641.939181][T19132] XFS (loop3): Invalid superblock magic number 16:22:58 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1642.322277][T19163] XFS (loop3): Invalid superblock magic number 16:22:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:22:59 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x19980330, r0}, 0x0) 16:22:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x8dffffff00000000, 0x0) 16:22:59 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0xf0ffffff00000000, 0x0) 16:22:59 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:22:59 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:22:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:22:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000005f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) 16:22:59 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1643.026621][T19187] XFS (loop3): Invalid superblock magic number 16:23:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:00 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0xffffffff00000000, 0x0) 16:23:00 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:00 executing program 1: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000005f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) 16:23:00 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000ffff", 0x39}], 0x1}, 0x0) 16:23:00 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='hsr0\x00') setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x40200, 0x0) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000480)) getsockname$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000003c0)={'broute\x00', 0x0, 0x4, 0xd9, [], 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=""/217}, &(0x7f0000000300)=0x78) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:00 executing program 1: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000005f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) 16:23:00 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1643.809998][T19239] XFS (loop3): Invalid superblock magic number [ 1644.303513][T19274] XFS (loop3): Invalid superblock magic number 16:23:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:01 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000ffff", 0x39}], 0x1}, 0x0) 16:23:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:01 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:01 executing program 1: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000005f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) 16:23:01 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1f, 0x1e659c09bc02e2ea) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20080}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r4, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4008804}, 0xc001) 16:23:01 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000ffff", 0x39}], 0x1}, 0x0) 16:23:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10020}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) get_mempolicy(0x0, &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 16:23:01 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1644.931213][T19298] XFS (loop3): Invalid superblock magic number 16:23:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\xff', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000280)=""/75, &(0x7f0000000300)=0x4b) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x1) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@null=' \x00', 0x9, 'vlan0\x00'}) 16:23:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000007fff", 0x39}], 0x1}, 0x0) 16:23:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:02 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x54000a08, &(0x7f0000ffa000/0x3000)=nil) 16:23:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000ffff", 0x39}], 0x1}, 0x0) 16:23:02 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x881, 0x400200) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:02 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d2b93c38f1870410cd8048"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe8dac0726906da58a5d1ab066f24351eda628c0e9e1b754fd65d2e4769d37cbcb5c", @ANYRESHEX, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c669eb82eec512200019b3d7280437a7462010000000000000029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad4cf8d1b12b1894ef983d0c11"], 0x0, 0xfb}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:23:02 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000200000000", 0x39}], 0x1}, 0x0) 16:23:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x42102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 16:23:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6aa6, &(0x7f0000000540)="ee00"/11) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) init_module(&(0x7f0000000000)='ecb(blowfish)\x00', 0xe, &(0x7f0000000100)='ecb(blowfish)\x00') setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x3) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = dup2(r0, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x16) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x8000, 0x0) ioctl$TIOCGSOFTCAR(r4, 0x5419, &(0x7f0000000400)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x8002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r5, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r6, 0x1ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x1ff, @dev={0xfe, 0x80, [], 0x16}, 0x1ff}, @ib={0x1b, 0x9, 0x5, {"da59b461a7b030bc571d0908c01bc0ef"}, 0xfffffffffffffffa, 0xc8, 0x9}}}, 0x118) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) 16:23:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000400000000", 0x39}], 0x1}, 0x0) 16:23:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1646.204408][T19386] XFS (loop3): Invalid superblock magic number 16:23:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") unshare(0x6c060000) 16:23:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000a00000000", 0x39}], 0x1}, 0x0) 16:23:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) 16:23:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1646.443107][T19416] IPVS: ftp: loaded support on port[0] = 21 16:23:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000f00000000", 0x39}], 0x1}, 0x0) [ 1646.740053][T19435] IPVS: ftp: loaded support on port[0] = 21 16:23:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00006000000000", 0x39}], 0x1}, 0x0) 16:23:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x5, &(0x7f00000013c0)=""/4096) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) 16:23:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x8, 0x0) fsync(r0) 16:23:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x0, 0x0}, 0x0) 16:23:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000a000000", 0x39}], 0x1}, 0x0) [ 1647.002286][T19445] XFS (loop3): Invalid superblock magic number 16:23:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000f000000", 0x39}], 0x1}, 0x0) 16:23:04 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x2) 16:23:04 executing program 1: r0 = socket(0x200000000010, 0x2, 0x0) write(r0, &(0x7f0000000080)="2400000026007f000000000000007701000000ff0100000000000000ff05ffff0100ff10", 0x24) 16:23:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00007018000000", 0x39}], 0x1}, 0x0) 16:23:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:04 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x4) 16:23:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x16, 0x123, 0x0}) 16:23:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) getsockname(r0, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, &(0x7f0000000000)=0x80) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYPTR64, @ANYBLOB], 0x2ca) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000002c0)={'veth0_to_bond\x00', {0x2, 0x4e23, @multicast1}}) socketpair(0x1b, 0x80004, 0x4, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000200)=""/82, &(0x7f0000000280)=0x52) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:04 executing program 1: 16:23:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000731a000000", 0x39}], 0x1}, 0x0) 16:23:04 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xa) 16:23:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:04 executing program 1: 16:23:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x246000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0xe34}, 0x8) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1647.802997][T19509] XFS (loop3): Invalid superblock magic number 16:23:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:05 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00003a1b000000", 0x39}], 0x1}, 0x0) 16:23:05 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xf) 16:23:05 executing program 1: 16:23:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000), 0x80000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xa9dd) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:05 executing program 1: 16:23:05 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00001b3a000000", 0x39}], 0x1}, 0x0) 16:23:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:05 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x60) 16:23:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x200, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000002c0)={0xffff, "d17072130b3680d9b5a696eaef09e0fe092756898829ff3d507faffa8cc3b086", 0x1, 0x7, 0x4, 0x0, 0x2}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f00000003c0)=""/38) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r4, 0x508, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2000000000000000}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x46}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="3fec", 0x1a0) r5 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000400)) connect$caif(r3, &(0x7f0000000440)=@dgm={0x25, 0x1, 0xcd9}, 0x18) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1648.763627][T19556] XFS (loop3): Invalid superblock magic number 16:23:05 executing program 1: [ 1649.136759][T19586] XFS (loop3): Invalid superblock magic number 16:23:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000003f000000", 0x39}], 0x1}, 0x0) 16:23:06 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x440) 16:23:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r4, &(0x7f0000000100)="35e34a006d09b522d4ef85aa70709caa6119ea33eb8a0dfd644cc53b0a4082b12e73694c8fe8129a454c98fc4d5334d8b7d25de1a1988b220c42074fdc063f79c3d1cbc38a0dce6c3a55b09374af5f565853a746b88cba5c1bb26abc7a69c8fbd66a612df5dcfefa3ef1c1e3992240198354f1b6fda84a8b0cabf21628372cc08da1f14ec254c187446a3b9f93a566c14e1276f2de66c11549", &(0x7f00000001c0)=""/187}, 0x18) 16:23:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:06 executing program 1: 16:23:06 executing program 1: 16:23:06 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xa00) 16:23:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000100)) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000040000000", 0x39}], 0x1}, 0x0) 16:23:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x8, 0x0, [], 0x3}]}}) 16:23:06 executing program 1: [ 1649.709985][T19607] XFS (loop3): Invalid superblock magic number [ 1650.138763][T19637] XFS (loop3): Invalid superblock magic number 16:23:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:07 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xf00) 16:23:07 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@ethernet={0x0, @remote}, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000240)=0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:07 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000060000000", 0x39}], 0x1}, 0x0) 16:23:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x0, 0x0, [], 0x3}]}}) 16:23:07 executing program 1: 16:23:07 executing program 1: 16:23:07 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x3f00) 16:23:07 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00001870000000", 0x39}], 0x1}, 0x0) 16:23:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = msgget$private(0x0, 0x162) msgrcv(r3, &(0x7f0000000000), 0x8, 0x2, 0x800) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) mount$9p_xen(&(0x7f0000000100)='skcipher\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2004060, &(0x7f00000003c0)={'trans=xen,', {[{@access_any='access=any'}, {@loose='loose'}, {@cache_fscache='cache=fscache'}, {@cache_fscache='cache=fscache'}, {@uname={'uname', 0x3d, '#])posix_acl_access.'}}, {@loose='loose'}, {@afid={'afid', 0x3d, 0x4}}], [{@uid_gt={'uid>', r4}}, {@context={'context', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@smackfsfloor={'smackfsfloor'}}, {@fowner_eq={'fowner', 0x3d, r5}}]}}) r6 = msgget(0x1, 0x41) r7 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$smack_current(r7, &(0x7f0000000500)='fowner', 0x6) msgctl$IPC_RMID(r6, 0x0) 16:23:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x0, 0x0, [], 0x3}]}}) 16:23:07 executing program 1: [ 1650.831569][T19659] XFS (loop3): Invalid superblock magic number [ 1651.287059][T19687] XFS (loop3): Invalid superblock magic number 16:23:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:08 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00001a73000000", 0x39}], 0x1}, 0x0) 16:23:08 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x4000) 16:23:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x4) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000100)={{0x2, 0x3, 0xfffffffffffffffd, 0x3, 0x6}, 0x6, 0xf2aa, 0x80000001}) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:08 executing program 1: 16:23:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x0, 0x0, [], 0x3}]}}) 16:23:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x1b7}, 0x0, 0x0) 16:23:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x100) sendmsg$tipc(r3, &(0x7f0000000580)={&(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x2, 0x3}}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000200)="c710f1ed0de1cbacb9ca45ad307650d2", 0x10}, {&(0x7f0000000240)="52c9430de48d50c10c75c7ab763b2b83911bd7e269ee6398844f113f1b2179c6bffd2e5555bea860ae334d2514673bacf0ac429ad6e66e66fd53e56e1bc5850f31fb6110f76e3fcff02b0138c07424da41366ab30e99c71241065dd8c917451ba0f70f5f9ed7b352f7ee89f4f676b4510689a86e8e005bbe303d528e9645f3b955b31239a3d0b429e633eab412761ff78544a3cfc4e933214fd2d4b8009717080c33a44f3b8c9d45aa862579fb5ab18b6c5a156d5ee5df4697cdae9bfb8c6f28707ecdcdce8b08f7bda1", 0xca}, {&(0x7f00000003c0)="470fae7a81fc3da673affda0bf6d25737c5d8925b284ca970bcbccf07e1207d0936bf355f967a8bf23cc104baba41e4a27ffe712d834d98be6026027e8079a8df993cccab8fc76ee80f175cc7b538c9dbbf7bd31367c5f469eac57c010d764667431550652e286fecc203e00f69429d8730a6d777aadc81139fa68f90326e9fc30f57a62b9357ef01cd0537eb16f50d93608db655e654dd6236ce9b017d5ef697d3cfdfd5c", 0xa5}, {&(0x7f0000000480)="cbae2fccc0224f9617445451990fb3d6b583ebd2d3968d06d60ab4c5b5170cc8136b87d677ada64d325b3bafce95c22d0e2f6313c66ff5221d3cd026aaeee3e04c6a087aadc69e8502d52d88e8d1ed91f0558ff73314313bf459ded16d820add91b0edcefcc15301dab70937748adb61d5de961decae4b9ba8bd4462f7e8687d8269b9104762fb1c5d8e7587285006d7936dd1eb433b26ce519221f05785eef9426e0a8d0b03fde07b3526e86e766f1630398dfc", 0xb4}], 0x4, &(0x7f00000013c0)="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", 0x1000, 0x8000}, 0x24000000) 16:23:08 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x4004) 16:23:08 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000040030000", 0x39}], 0x1}, 0x0) 16:23:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8}]}}) 16:23:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x2) [ 1651.982930][T19712] XFS (loop3): Invalid superblock magic number [ 1652.346907][T19744] XFS (loop3): Invalid superblock magic number 16:23:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:09 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000003400000", 0x39}], 0x1}, 0x0) 16:23:09 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x6000) 16:23:09 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x80080) 16:23:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8}]}}) 16:23:09 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000100", 0x39}], 0x1}, 0x0) 16:23:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000013c0)=ANY=[@ANYBLOB="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", @ANYBLOB="48258902b16499cb5892779e71d364cd42180935a76fa0a8009c12490389d052524e4058174398", @ANYBLOB, @ANYRES32, @ANYBLOB="0b1dbf884312c251d3a72be088bbe092ce2a80a20e5e9dd95718fe1b87d9be075104dd4d42454623a68098eaaff12038054ff2184cd6ae400861a96a7abbf31cef5ca59807ca21faab2211bc711d4b79fda8ff5b493cb859d7b75e0f6cdf2b130f2fff11d4df80a1d31806245745e67d", @ANYRESDEC, @ANYRESOCT=0x0, @ANYRES16=r1]], 0x8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:09 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x34000) 16:23:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xe6bf, 0x0, [{0x0, 0x8}]}}) 16:23:09 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@errors_remount='errors=remount-ro'}]}) 16:23:09 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000200", 0x39}], 0x1}, 0x0) 16:23:09 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x400300) [ 1652.953787][T19764] XFS (loop3): Invalid superblock magic number [ 1653.483421][T19803] XFS (loop3): Invalid superblock magic number 16:23:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x88, 0x0, 0x0, 0x0, @ib={0x1b, 0x6, 0x4, {"429dc3e262109414e3f0387e9cf09329"}, 0xfffffffffffffff9, 0x9, 0x7}, @ib={0x1b, 0x40, 0x1, {"4f81f8e76aaf787184eef6fcb7271590"}, 0x7917, 0xfffffffffffffffb, 0xffffffff}}}, 0x118) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x80000006}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000008, &(0x7f0000000040), 0x10) 16:23:10 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000400", 0x39}], 0x1}, 0x0) 16:23:10 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x1000000) 16:23:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x101, &(0x7f0000000840)=0x4cd9, &(0x7f0000000880)=0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:23:10 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x2000000) 16:23:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:10 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000a00", 0x39}], 0x1}, 0x0) [ 1654.011855][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.017672][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1654.023566][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.029332][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:23:11 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x4000000) 16:23:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x14, r2, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 16:23:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000f00", 0x39}], 0x1}, 0x0) [ 1654.168861][T19829] XFS (loop3): Invalid superblock magic number [ 1654.523822][T19857] XFS (loop3): Invalid superblock magic number 16:23:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6b, 0x200) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000000c0)={0x771, 0x100, 0xff}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[@op={0x0, 0x117, 0x3, 0x1}, @iv={0x0, 0x117, 0x2, 0x0, "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"}, @iv={0x0, 0x117, 0x2, 0x0, "a7acba4f1b622cd01d76cfe2fd6e5176cb0113846cc9ff5a9e6036beb92994ab009d438749af7be0244c09c88cd99f080ff59985849ec6e19e603fb5e52f709d994caa46f89ae29ae16bada0ffb4b18e307252741a68"}, @iv={0x0, 0x117, 0x2, 0x0, "8ce3de699e4a63d60c873cf08d0f7ec1a7"}], 0xffa2}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000001b3a00", 0x39}], 0x1}, 0x0) 16:23:11 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xa000000) 16:23:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) signalfd4(r0, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 16:23:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x8000000) semget(0xffffffffffffffff, 0x3, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) 16:23:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000003f00", 0x39}], 0x1}, 0x0) 16:23:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, 0xfffffffffffffffe) 16:23:11 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xf000000) 16:23:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="12dca5e1c2000000000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:11 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x156) fallocate(r0, 0x0, 0x40000, 0xfff) 16:23:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000004000", 0x39}], 0x1}, 0x0) [ 1655.196134][T19884] XFS (loop3): Invalid superblock magic number [ 1655.627230][T19917] XFS (loop3): Invalid superblock magic number 16:23:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:12 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x3f000000) 16:23:12 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="3ba931dc4b2988e1"], 0x1) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000280)=0x1) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/33, 0x3e3}], 0x1) 16:23:12 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) fcntl$setpipe(r0, 0x407, 0x0) 16:23:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000240)={@rand_addr, @initdev, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@rand_addr, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000006c0)={'veth0_to_bridge\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14) accept4(r1, &(0x7f0000000780)=@can={0x1d, 0x0}, &(0x7f0000000800)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000980)={@mcast2, 0x0}, &(0x7f00000009c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a40)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000a80)={0x0, @initdev, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000b00)={'teql0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000001080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x280000}, 0xc, &(0x7f0000001040)={&(0x7f0000000b40)={0x4cc, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0x23c, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x24b3}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x7, 0x5, 0x3, 0x553c}, {0x6, 0x6, 0x5e, 0x2}, {0x20, 0x100000000, 0x77ec, 0x4}, {0x7f, 0x4, 0x14e, 0x6}, {0x200, 0x1, 0x6, 0x3}, {0x1000, 0x0, 0x0, 0x10001}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xd3}}}]}}, {{0x8, 0x1, r9}, {0x26c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x8, 0x4, 0x8000, 0x6}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xaad3}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb1a}}, {0x8, 0x6, r16}}}]}}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x4}, 0x20000800) 16:23:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000006000", 0x39}], 0x1}, 0x0) 16:23:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000187000", 0x39}], 0x1}, 0x0) 16:23:12 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r0, &(0x7f0000000140)=""/128, 0x80) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:23:12 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x40000000) 16:23:13 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000001a7300", 0x39}], 0x1}, 0x0) 16:23:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getpeername$unix(r3, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 16:23:13 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x40040000) [ 1656.234263][T19952] XFS (loop3): Invalid superblock magic number [ 1656.589237][T19976] XFS (loop3): Invalid superblock magic number 16:23:13 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x60000000) 16:23:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x210900) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0/../file0\x00'}, 0x6e) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.metacopy\x00') r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:13 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000ffffff9e00", 0x39}], 0x1}, 0x0) 16:23:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:13 executing program 0: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x6a, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") readv(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, 0x0, 0x0, 0x0) dup2(r1, r0) 16:23:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) dup3(r0, r1, 0x0) 16:23:13 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000ffffffef00", 0x39}], 0x1}, 0x0) 16:23:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfb2) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:13 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x9effffff) 16:23:14 executing program 0: r0 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000000000/0x2000)=nil) shmat(r0, &(0x7f0000000000/0x2000)=nil, 0x6ffe) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)=0x5, 0x4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sched_getparam(0x0, &(0x7f0000000040)) 16:23:14 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000700)='/dev/hwrng\x00', 0x200000, 0x0) r2 = accept4$packet(r1, 0x0, 0x0, 0x800) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000540)=""/230) request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000180)='/dev/snd/\x00\x00me\xbd\xab\x87.\x1f\xa5\x12\xf8\xc1ir\x00', 0xffffffffffffffff) request_key(&(0x7f0000000640)='dns_resolver\x00', &(0x7f0000000680)={'syz', 0x2}, &(0x7f00000006c0)='\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:23:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000fffffff000", 0x39}], 0x1}, 0x0) 16:23:14 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xefffffff) 16:23:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc04000000ebd555116d") r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x4, 0x800) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x1, @ipv4={[], [], @loopback}, 0x5}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={r2, 0x9f7}, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1657.202793][T20014] XFS (loop3): Invalid superblock magic number 16:23:14 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xf0ffffff) 16:23:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00007fffffff00", 0x39}], 0x1}, 0x0) 16:23:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xc80, 0x0) write$eventfd(r3, &(0x7f0000000100)=0x400, 0x8) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:14 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460006090608000100000000000300060003000000c7010000380000008a000000060000040100200002000400001003000000000003000000ff010000000000008100000009000000ffffffff0700000009001500000000600500000005000000e08d650f0200000000000000b60b000007000000"], 0x78) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:23:14 executing program 0: 16:23:14 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xffffff7f) 16:23:14 executing program 0: 16:23:14 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xffffff9e) 16:23:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00009effffff00", 0x39}], 0x1}, 0x0) 16:23:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) socket$alg(0x26, 0x5, 0x0) fgetxattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='ber\x00'], &(0x7f0000000140)=""/41, 0x29) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0xffff, 0x440000) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f00000003c0)={[0x10000, 0x5000, 0x4000, 0xd000], 0x2, 0x0, 0x2}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x143000, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) bind$xdp(r4, &(0x7f00000002c0)={0x2c, 0x6, r5, 0x3e, r4}, 0x10) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:14 executing program 1: 16:23:15 executing program 0: [ 1658.095386][T20075] XFS (loop3): Invalid superblock magic number [ 1658.444747][T20103] XFS (loop3): Invalid superblock magic number 16:23:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) prctl$PR_MCE_KILL_GET(0x22) get_mempolicy(0x0, &(0x7f00000000c0), 0x4, &(0x7f0000ffb000/0x3000)=nil, 0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1c) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000100)={0x10, @tick=0x8, 0x400, {0x6a7e, 0x9}, 0x8000, 0x1, 0x8000}) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:15 executing program 1: 16:23:15 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000efffffff00", 0x39}], 0x1}, 0x0) 16:23:15 executing program 0: 16:23:15 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xffffffef) 16:23:15 executing program 0: 16:23:15 executing program 1: 16:23:15 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000f0ffffff00", 0x39}], 0x1}, 0x0) 16:23:15 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xfffffff0) 16:23:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x1) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000100)) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700), 0x1}}], 0x1, 0x0, 0x0) 16:23:15 executing program 0: [ 1659.039857][T20123] XFS (loop3): Invalid superblock magic number 16:23:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:16 executing program 1: 16:23:16 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:16 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x40030000000000) 16:23:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:16 executing program 0: 16:23:16 executing program 0: 16:23:16 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x100000000000000) 16:23:16 executing program 1: 16:23:16 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f00000001c0)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40102, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000100)=""/183) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:16 executing program 0: [ 1660.008599][T20174] XFS (loop3): Invalid superblock magic number [ 1660.350721][T20202] XFS (loop3): Invalid superblock magic number 16:23:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:17 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:17 executing program 1: 16:23:17 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x200000000000000) 16:23:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000180)={{0x0, 0x7, 0x5, 0x80000000, 'syz1\x00', 0x3908}, 0x4, 0x24, 0x40, r4, 0x3, 0x100, 'syz0\x00', &(0x7f0000000140)=['posix_acl_access\x00', 'ecb(blowfish)\x00', '\'\x00'], 0x21, [], [0x40, 0x9, 0x5, 0xf626]}) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:17 executing program 0: 16:23:17 executing program 0: 16:23:17 executing program 1: 16:23:17 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:17 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x400000000000000) 16:23:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0}, &(0x7f0000000980)=0xc) syz_mount_image$vfat(&(0x7f00000003c0)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x1, 0x7, &(0x7f0000000880)=[{&(0x7f0000000440)="0182e50cf75dcf4d89b20914fee0bdb7a1aef4403dd8bc654d6d9f7a606367a04f54ae45b53c1d6835e807a531808bfcbd8cd0017ae013661832f7850096fa802c0550c5e3a3bfe1180cfab4a1ac3fa4980c909530e18f0b5cad133fe84ab958e119d051446de46eff78dea9e9977bc3aefd10eeba291d1c92fbe7a25d5e879f4b7a7a2cc4070cb954d55b54c2e6b1ceaf", 0x91, 0x20}, {&(0x7f0000000500)="466ed9799376370a3a668d96b275055f668e2e8fcf8f35fc0b56af3010e042c4a9d76655950fa89ed5fc663e6a23138a04dc7b502668d3658418b4ad580333b7385bb250cabc43db4bcb89c4a312c8ce0bba817702495778daa14e57fe431df4b95eeaf73396ac40ac097df4557195cdb926d29d4a3a95c09c52d41b259c72dbb3394bc0cc7418e92c60836292b3dfbaad9ecd97fd5b611889ba46951633dfebf57acaa8fa3e5ce27f5489274e7d454432f03d178c17475b00d8f34ec57c398f690012c54725f7053c363ecd713ffc5431ced1d961219c1d", 0xd8, 0x3}, {&(0x7f0000000600)="698494204058db3012bdd15a30194ae2dac650a93cbae89eb742c6ba17bc9a5023746cb0de1808e6e5c80e1ec132409984811cb1cd70ea3216bb110d4bb84f681766febbbfd4c1fd373d0ab8583e4c39c35ff2e5e1668199980d83589f651875cee57ead036426094d1b90692baad6eadbc6470a8c1187b018e62b3f796b8e60fc155ffdfc8701491818768dc2", 0x8d, 0x7fff}, {&(0x7f00000006c0)="aca785f6939594ec546d9691bcb2f5b6e036f47656fda5b7d8395370f199ee0e43ebb710460330e66a57a2fe798580dbe30caa307909280161b7fed8b7a07f5e81187304ede6d78cca9316bb419baea88d9a2d67f836c29b4f2f42a467e1d07ce9d3eb45790ffb33beac9cce9132", 0x6e, 0x444bd8b8}, {&(0x7f0000000740)="da940fb614ac3d1667011337b26d96317dd95fc6e6a4bce7edef7d266979f8d5a64bd81618ef82b015767bf8efadcc8eeeadc36a666b2651040268ff7ff1b9b8c747c05096378382bf0e25f834d575d1472066bd516d80b2fc13c4d28b6458baedd023a7645fd213ce53cb72639f1330ae304a9fc19e024991eb7e74c2f2ee71eec68b43eecd8cbcfd546ec7a69da3fd5e17013a0f855d164a7d815cd2ffb7ffdf71730c0cd85e8a45bb0d2a0456a8eb9071", 0xb2, 0x2}, {&(0x7f0000000800)="3683990aa643af39625d7ff087ca335be64c7fd0076b1e55705cc3afd416", 0x1e, 0xb}, {&(0x7f0000000840)="984d3c8ddfe5e93e4d37803c135b5f0e2ae27cef28ad4595d2004bc9dba1af1278", 0x21, 0xffffffffffffeea9}], 0x3004c, &(0x7f00000009c0)={[{@utf8='utf8=1'}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8no='utf8=0'}, {@uni_xlate='uni_xlate=1'}, {@rodir='rodir'}, {@numtail='nonumtail=0'}, {@iocharset={'iocharset', 0x3d, 'cp737'}}], [{@uid_gt={'uid>', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(em1vboxnet1/md5sumcgroup'}}]}) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r4 = dup(r0) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f0000000300)) r5 = getuid() getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000200), &(0x7f0000000240)) write$FUSE_ATTR(r4, &(0x7f0000000280)={0x78, 0x0, 0x7, {0x100000000, 0x81, 0x0, {0x0, 0x3f, 0x7f, 0x8, 0x7, 0x4, 0x5, 0x5, 0x9ec, 0xfffffffffffffffc, 0x3, r5, r6, 0x7, 0x1000}}}, 0x78) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, &(0x7f0000000100)=""/241) 16:23:17 executing program 1: [ 1660.986291][T20225] XFS (loop3): Invalid superblock magic number 16:23:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x15, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:18 executing program 0: 16:23:18 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:18 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xa00000000000000) 16:23:18 executing program 1: 16:23:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x171200, 0x0) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0xe26) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002c80)={@empty, 0x0}, &(0x7f0000002cc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000003500)=0xe8) sendmmsg$inet(r2, &(0x7f0000007680)=[{{&(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000100)="d97eea48ffa9dd613cd3857d68b8f99662e93396e0adb4304dfc6d318834604dfc8cbf7b42578854c54603c28f89f43b5f2720e5eadcc0be09e71c7607f6ae", 0x3f}, {&(0x7f0000000140)="fb37172dcec4f0200f70ff68d7614b7656ae2c93c756b9baaf54eb5c6a0562c3127634a3ab4ec15b7c7789134b745dd9428ba2d9492a294d111d80be90b8581216cd90b5b72909ee8295c61f32c48d7de1cb3498629bd415de36f0304de2464efac20b06b576d3c01c0413a186f9780ed27eae1e307687af59bd90030efdd33c74ebcb7ff230f2654b86005731a9e6fd330f7f257508782ebb5748e865fccbbcb5f91e9965b0b1aecdbe79030dd11e33b43caebddb3102f08dce0679b5a8b492eebe7e9e320bd557b4b6f2430fe66543f8e21da6f4b67855c308", 0xda}, {&(0x7f0000000240)="748e51970024ce5a779ab46793828d37c84c7c7e79330a9e49a45b7d86444e97193394fd96b632fd267b5a549d2803", 0x2f}, {&(0x7f0000000280)="8c3e54f204fef16b5580e184cdbca2d3af166adfdbc312f67a58b29e7d47e87a25b600e8236a3792b02808", 0x2b}], 0x4, &(0x7f0000000500)=[@ip_tos_int={{0x14}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @multicast2, @multicast2}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfab}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffffffffffff9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x98}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000005c0)="4cdade629a4203127b9b801c6e4b8dea0b61ff7868fe600a461392d99bf44efca8b3ca70ba3432d757da73ee1481b641a153b4d782e4cfdd2e55b184c906eed60cde7cf456f0c43447377861c056567a2a354b8f3ad9ca779a5be11eee62406f367465aabd9242e4f115d43dfdd0663bc5f1d2e89a7d631e8c0645f617930b110e64abe1e6feca43753aa0f85870772f7d9673b79128c2c8e25ce961c248bef9", 0xa0}, {&(0x7f0000000680)="da66e2243cec116229fb9b34174b4586c649f76c26b64540001d7e1bc4cc6e6c65e6f215ca948ec82ae01d932a6e723bd1fa84e3e5acbbd4b817e72eb9d94b54042e580b219e95830973c48cd51e40671154f8121b2fc8c58d2b8044dc07d7d7cd313afd2f00c069696bc20ec76069dff103203c7c204e1a2e3a9ec21599641f907b76fc3446bafe5d588e244062f439cac7ecde19d58aeaf213898a2e6f5cabfdc0e8e09a99e44fd01e2fb69f84da", 0xaf}], 0x2, &(0x7f0000002d00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x200}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0x7fff, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}], 0xe8}}, {{&(0x7f0000002e00)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000004580)=[{&(0x7f0000002e40)="41f7495c6712cf037a623c3639fb753e7ee718e272ad8792ba69306b506afac8929c61b6550a1d15c8915be58d1fa3d0829bd80d739a34273244607ce435a7204821a7d06fb3481884426a4d1f33530f4e395474295970e550d68a5792d1a0dc523efde102d42ea5aeb931dc6b205448659d696324953453913eb4c187f82426461ac4c6b3e7f39f76ea060709ac7150c98f43e621c47ad2bc4e4e0c981c2b207cd38563a578", 0xa6}, {&(0x7f0000002f00)="a286216bf4a65731add95eecadb13b0771ac6c7d8a", 0x15}, {&(0x7f0000002f40)="ee0370fb6dfa5e7260e64851f2629f064820def942fe4377c77a4a9c446f9f7299efa49f61830547a0210240ee65a0106cc8ebd04dfadb2279bf7df72a72cd8dd9bb4988e1f8", 0x46}, {&(0x7f0000002fc0)="188fd314d79b66ab61b41e76d92f6c59543f577677968c9916538035c321f7d9f9ace24c9e418391f9ba447a4b7f0a025c22d26c39785b6c8eec97fec8a384dd422065c5cf400497f2c5ff2653ccf2203963b0e216ba0bc2607411b1b2db9d542893481450a9646c9eba0270e9f58fd9111fa8e4c97d325e8e4d55aa74c5dc8b3f1a8b78ea93494d848a38be8cb8156e197526d0c332437d6346dddbe005ccd9065535db1287", 0xa6}, {&(0x7f0000003080)="192214b255ec347a6491c1446f82970208587a4d1d072f7b417217ca2bbdf50dde528c803983926bc9752c8151ea95f96d284e68d9daf237d3aeda6359c213f5a8acd1f475b10229f16dab0eb15073bd4185c00fe5c145ffdcad302b20d0e0560d7f1be4ec05bc05f527de8d589163860f88f3", 0x73}, {&(0x7f0000003100)="bc71b4ca492c3ccd1951491dab300f3eccc1dcf1e4c78800fb9dbadf025c5d2c3301747970314ca679752a07128197efe2755ac9ff6b11384ef35ad8ce2acd2f2f57725f262095a223a4d32198446d44cec078fe43dce345c622f4c51f86b287ebbf9f3f4cb54c180b6b02e789d2a60a3d07244f339932b5f11ef33d80d711fb80bc38a979df116b98f28d9f4ec031dc57319826d6b764c5fd5176ee51ba600f1e11e585e609aa0debfa269d8dcdde5cbbf10239963e114681bcc1c5452cf6248a997475e67c4be12d7c1a32a320252829ffd0efd9fbe0", 0xd7}, {&(0x7f0000003200)="9b20ae360a17382394e51302405f29d2a9ee36fc17566eb17d66021f710ed450527b7a79564deb0457e78a7d94a0b14280528737f22c51070df83ae89fd6bcbdf1aaa0b178b05fcf01ca5784d8f4c8e66e08d9dd7fd6ecb0f99feb3ebf2662c2fe0b0096dc3e0871486ea09ad1bc990211d0b1fd9627", 0x76}, {&(0x7f0000003280)="e8d7bcad2eb9762508e4b93b463e7ba2c49c8460753f80676e109e90b4e30e910b78c410b9a7f70200af2d57834c5d6de91f739dcaa7b71d1a914dca3134e36d1abf34ebd4cc0c033e52295e8504eb79ad767f1cd164b854e6d7474a3a213eb9ca4e633b089b3850d11152aa6a9cd67d7b242a885fca0bf58052fd41653d00bf453919c0c944735af612a8edfe2e7e35ab0260fb509f6299afd304223f929db456298385d761322a233b540346d1", 0xae}, {&(0x7f0000003340)="312ddc671cb2a2defbb3fde9b8b57a8469db67299a1f6bceba6012e56325b5e85c93abb2cc6569c39f15627ad9503cadd908d44cb10a6c2e18be9fc5d6c85d29cb0b0f9f7c704219f0ec9b9944fe9927fcf82b3543a88b054a17d55398383af815148ac6800293d139f4f708071b6c878c25855b12f95f69cb6ecbc3b65887023dc56b892ed1ff1582471d3af9a6266c5430acebbd", 0x95}, {&(0x7f0000003400)="445e7cf989a643933b54d70e799f2e9b83bf6e2d457de9bc8a59c4e3f4587d746c8acf35fac07e067f9a7c47739e20d9a4b75ce771c026b01457df797dbe49755763f9c22175a939254b8458bcd213a8b744854430c7a40b636726f9a21550eb6a3413415078229b5fd39071d188cfb7f11ab1bf38d4e9b9d442735e24dd78e70bf2d788822d2a6101b5bd95a6b4510eeee0893ce534158fe33dc0f429678618f9a92d9b9d6e354fb01968fe1e5bf8a32a2f140e76542f60493d1ae3f0cfebbc93463a879e9be623a49099dd77c4fa123d3d43275ba63174e1b4ea468372ac3482b1a457d709e6c30c64194e", 0xec}], 0xa, &(0x7f0000006840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast1, @multicast1}}}, @ip_retopts={{0x94, 0x0, 0x7, {[@cipso={0x86, 0x3e, 0x2, [{0x1, 0x10, "1a50e88390859ea81354bf06aca8"}, {0x7, 0x4, "5bc7"}, {0x6, 0xc, "f7cb9053243e769ecf07"}, {0x0, 0x2}, {0x1, 0x6, "9bd8dac2"}, {0x5, 0x8, "696d101f5065"}, {0x3, 0x2}, {0x7, 0x6, "f7fc2833"}]}, @rr={0x7, 0xf, 0x9, [@broadcast, @multicast1, @empty]}, @lsrr={0x83, 0x1f, 0x0, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @remote, @empty, @empty, @broadcast]}, @lsrr={0x83, 0x17, 0xd0, [@loopback, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast2]}]}}}, @ip_retopts={{0x10}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfffffffffffffff7}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@noop, @noop, @timestamp={0x44, 0xc, 0x4, 0x0, 0x1f, [{}, {[], 0x6}]}, @noop, @lsrr={0x83, 0x13, 0xd5a4, [@multicast1, @multicast2, @rand_addr, @dev={0xac, 0x14, 0x14, 0xf}]}, @generic={0x44, 0x10, "4ae52b7ea713b7bfcce1b1cb58ae"}, @timestamp={0x44, 0x14, 0x7, 0x3, 0xffff, [{[], 0x5}, {[], 0xfff}, {[@empty], 0x80000001}]}, @lsrr={0x83, 0x7, 0x8, [@empty]}, @timestamp={0x44, 0x8, 0x987, 0x1, 0xfffffffffffffbff, [{[], 0x4}]}, @ra={0x94, 0x6, 0x6}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x101}}, @ip_retopts={{0xc4, 0x0, 0x7, {[@timestamp={0x44, 0x34, 0x7, 0x3, 0xfffffffffffffffd, [{[@empty], 0x180000000000000}, {[@rand_addr=0x6], 0x3}, {[@multicast2], 0x4}, {}, {[@rand_addr=0x9], 0x7}, {[], 0x101}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x200}]}, @ra={0x94, 0x6, 0x29d}, @generic={0x83, 0xa, "3bd31ca861a83c20"}, @ra={0x94, 0x6, 0xfffffffffffffff9}, @cipso={0x86, 0x44, 0x200, [{0x7, 0xb, "63a6c3520001704fa9"}, {0x7, 0xa, "7a2006bca260e84d"}, {0x7, 0x7, "a073cbc881"}, {0x7, 0x12, "67d835dfcf275051db4a0bf5866fb032"}, {0x2, 0x10, "2a4bd81426ce96650b680da25910"}]}, @noop, @ssrr={0x89, 0x1b, 0x3, [@empty, @empty, @remote, @multicast1, @local, @multicast1]}, @rr={0x7, 0x7, 0x4, [@broadcast]}]}}}], 0x230}}, {{&(0x7f0000003540)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10, &(0x7f0000006cc0)=[{&(0x7f0000004640)="66aed33d38", 0x5}, {&(0x7f0000004680)="e2766533532363158daf5a0172f8bf3f8556640272b442d4a43798a6b0532becebf7499ea8e94354c788aabc7d66f1b52df4c1f4db525fa021c5689903fad410c8d5b8018918864a06bad58e", 0x4c}, {&(0x7f0000006a80)="0db4071b9ce9a8ce4f7efbe4827a7771c64fb9f47bb1c4b7a1892871d1e135fc64dd437acbedbf0e8f50e4ade10b0cd3f783630cb6361a4440efe271da6106305da1f591caf4e285beab6093b1a75d75b44822bc7a91525928d953348c224cde37b81bb13d369ccaff1019a6854909c0f2b3205911c14aa5cfcb1fe511bc6944190baf855c671a5c8d0cb5879eff637c43349b54f7219ec1cecd20ab8b97d8bf2b4bb2cf6da55ce4906d36131af4f2ee5b16077dc6bc21a11144f5f4a12a7f78687127df", 0xc4}, {&(0x7f0000006b80)="7e9403068477593227dd78288609314d634667bda779aefc1b39b4006717496f2e25528b4c3db85c26e6c0f883cab1126ce2965f5189b1293108603421b67758b666d3c742f2c791f3e3e19d29e75a2dc8663f125678a7b9ba81ce6820f3f00228e485b793da84e31f6559db533cd76aa25e5a1ae0ab7a728fca063fc9711bf9f0633ca27226", 0x86}, {&(0x7f0000006c40)="a9e8d3712a79f3fbc192c708f45ae47d8434a84900", 0x15}, {&(0x7f0000006c80)="8a9e8101b51a52aa176f1309d4709a438d52111a17d4f3f76fae5c7317b4c3cf6ee3da9a9feb0482f738", 0x2a}], 0x6, &(0x7f0000006d40)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x3, 0x3, 0x0, [{[], 0x4}, {[@loopback], 0x6}]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@generic={0x47, 0x7, "ee6400e875"}, @timestamp={0x44, 0x30, 0x7fffffff, 0x3, 0x4, [{[@initdev={0xac, 0x1e, 0x1, 0x0}], 0xffff}, {[@remote], 0x6000}, {[@dev={0xac, 0x14, 0x14, 0x2b}], 0xc5}, {[@local], 0x9}, {[], 0x1}, {[@multicast1], 0x4}]}, @ssrr={0x89, 0x23, 0x9, [@remote, @loopback, @multicast1, @local, @multicast2, @broadcast, @multicast1, @dev={0xac, 0x14, 0x14, 0x21}]}]}}}], 0x90}}, {{&(0x7f0000006e00)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000006f00)=[{&(0x7f0000006e40)="a5781706c9dc3456f06c3074104075984c5a1bd02f8e370ac324c2b4e4a64f8358a0be40528aa244f71d1230c4fdcd4dcab0046f5ad248427abc7649826ccbabcd3e2824fbc5b04ab3b20f52e2ea16b6885be9dff6947e2a9472fff32623a7ea7bd3ba12aa31f904be5154b4fba51b6223edca3d1d88e8e2681c080c4e66aab038a7db11cc191c12f9a5208e49265f4611a3c9664dd210da4dcd5e43d1f825f29c9524d8fbeb", 0xa6}], 0x1, &(0x7f0000006f40)}}, {{&(0x7f0000006f80)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000075c0)=[{&(0x7f0000006fc0)="dba406118b92fb4e384e4cf8d8623625183cb66732a272cc86eb6c20d07e40309ff1ed9b6d7c4a0a5509630889f274716b5bc9840bc80981b8e63a5d3c5cfb5870714a9aa521e6126449a1c050d1e9ffe3692a45516703e70d5ba6e02f50380b59a97cb96e2d6d675c5944dde58241fa19a123754c", 0x75}, {&(0x7f0000007040)="57e38cc174b8aa400817be5f04f856f0b12f67daecca879bae818d13eff13c274d79355f1c15fdee95cf6b45ead7c6097c1064ae25b76036dd84ae52ab6e99b372f1bb9c2c2da4225c4061c37abe3bbac54bf75ef4b71083a9742f25fd6632e32fe4e1f1dc0a7444a6b17ba6d5a89bd177b625ac9ed6e7169d2d5fe87517c4ef94a0f8093b8dbfbbd908fce7ce6b02b9f1a2cce8f93c1bc53250fead1bc08eead357e588c09b4c5777043ddd42b3b1cb549e14835716597de457af7589d27c327f20d09ea94f48ca9eb4ca0a51c11958908663ca4a55a9", 0xd7}, {&(0x7f0000007140)="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", 0xfa}, {&(0x7f0000007240)="6deceae34b0888bb83b24ed93dc152cb8536b10ce9702dc64e4e100003448fd933944c0643d8522b498e0e808efd04abfeaeb07c69815c947b6927efa66da62648b4972f178809d66e692633e45131a7038aceb9eba8fa02e3700aacc5da60874af33392aaad1da3d23e73a6c08d6104a3fd5bba6e0dc392a9b89ab411b71faf080d1d7793ca442a140098d324b499f6d8ffd7d9578ade693db8ec503c314162add58b79db6be5917f57e6cd291beb91508e639eaba54eca3b62", 0xba}, {&(0x7f0000007300)="bb036832965962d9c0a84d31a026048737588ee304dbeed76f1e2d4cb0d43d61c01605ce725c7557712e659922046d0f00c91e5d10ccc2fb74c33a8baf02a30650b740c5622a9b2c090b718c10c71f7f3759509475e8d1b1b70a41ac267e36d279dd17fdd5345e27aafe189aa63398c19e90e65038d12a48f78a1e7fe8a291d7a5578190555d26063bfe8e139c3ac599f5b570c4fc7fa280d8a26167f4cdf07e3afbc351fde8acec63befac6eb9bec0579f6b81cea0469720970c04532fcf26a3bec1ec785f9", 0xc6}, {&(0x7f0000007400)="33235690d415e5c693787db319de77e980c716eaa88d097247b27bf6455eed470a05d2292df5c8c598cb6afa2ed1939730c95e45e823f622653f70528e43f5d7f3ad20128ef25f7aaa6e6233ddbc992c7dc459435022f23d0741a85d576d764ffba7b2c2003bf628bf6a03355dd61dc1a40c1607300a5ab2bc8816b6d19b4bbb3315945e4f064638a5c9ead4907caac5c8bbddf46bd1d3ecbe1ccabfd199b4243f6f1f8b93883c539dda454d2f4059a8143c3b15d92aed9b55f0376c5d9d51b10b83fb77501d6101cc8c4c430b4f6e87336e5d29e0e35f2fb0225dafe0cbaa08942513b5cd0ab2d10580f90209d21c1a290d48d6ec9e3094", 0xf8}, {&(0x7f0000007500)="69f14741c434ba4f53b38bf06ee7eacc780162e1288caf8c7d807a828beddc2d14e2316780c0ef303c1e8dde3a194b3d4ab03106e749ed76dcd6f3d0294ce3be9d8cd97fb13b0307d2eca9b057", 0x4d}, {&(0x7f0000007580)="cb0dfc50b9699c65bbc69faa7f29b27b80aa7086dd5692c4f21774d78c34df418037aef854b938609e133d6d378b6d3f8fae384103522464fdd45926", 0x3c}, {&(0x7f0000007e40)="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", 0x1000}], 0x9}}], 0x6, 0x40) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:18 executing program 0: 16:23:18 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:18 executing program 1: 16:23:18 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xf00000000000000) 16:23:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="41b2a5a8a0aa7d252776bb3c6e80f31df5e812aec12f499746217d5616e5a6859c49737968546dd60d4e", 0x2a) 16:23:18 executing program 0: [ 1661.914775][T20279] XFS (loop3): Invalid superblock magic number 16:23:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x16, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:19 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:19 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x3f00000000000000) 16:23:19 executing program 1: 16:23:19 executing program 0: 16:23:19 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80400, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000140)=@rose={'rose', 0x0}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000100)={0x100000000, 0x59b, 0x6, 0x1, 0x3f}) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0xb) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:19 executing program 1: 16:23:19 executing program 0: 16:23:19 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x4000000000000000) 16:23:19 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x80000000, 0x80) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14, 0x11, 0x1, {0x0, 0x4, 0x4}}, 0x14) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) prctl$PR_SET_SECUREBITS(0x1c, 0x10) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$inet(r0, 0x0, 0x0) [ 1662.825344][T20328] XFS (loop3): Invalid superblock magic number 16:23:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x19, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, r0) 16:23:20 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:20 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x4004000000000000) 16:23:20 executing program 1: 16:23:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffff54, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000001701000003000000000000000000000000000000000000001701000004000000080000000000000000000000000000001701000004000000050000ffffff7f000000000000000000170100000200000000000000219dd96b1cdda162e9d28549afe9a82b2566dd4efc5ad706cd4b9f7af802b97324398e45281a3eeb8031bbd020b5695dd9aee103e3400acd7723a27cc09e526f98ab4d8e318c79f6000040b9adc886ba273420e4a8500031ed9f1e7e6516b4344124b895ab5629dbb32d03bf575f2a31ae79ed91d4db648611d944b22d0c8d4944a900000000000000000000170100000460cf00bc17000000000000"], 0x18, 0x3}, 0x1fffff) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x408000, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote, 0xff}, 0x1c, &(0x7f0000000300)=[{&(0x7f00000002c0)="d9ae1b6b1776b0cf2d45d511a68335a015f64185981613aa621779340366b8d94ed256dfbc18bd14dfe6699b4c1f19e4f070eb", 0x33}, {&(0x7f00000003c0)="ad9cf8e444b0f2e951fcea71ff170bc581015839a955949577457a413eccf31ce8a89cc0f436f4f3f5399836bf6a0f141d8943d94898d8eb479f1a2152fb6ae74e2804ec0e096b916ec885a6cbac7794a492d87fb1d7d0a76826a73aa80254ba50f58cbf76995fba14cc78a1712e6157bef64d8cc097f415a96eb6a342bbe645988ae01b94d9a50b4fbeb937", 0x8c}], 0x2}}, {{&(0x7f0000000480)={0xa, 0x4e22, 0x6, @empty, 0xfffffffffffffffb}, 0x1c, &(0x7f0000000540)=[{&(0x7f00000004c0)="32310aa9a2279dd542423e06df97ec8fb53b19579bf04918de9fe6064216aca6de20c80b3785e18dcea1d98a39b01501543502d8d87056f2945a121fb1d8891ebd639ed5b4221ea3a4161010bfcc9673d0fcdff2f43b", 0x56}], 0x1}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000580)="7cc0434262ac1bff834795effba3767498a15708c1f0ac0688ef8fefeb325d8f87979f0d1f6441e2a2d03bf4242a333fb4c738008318af2936f2381009c8224bb6839e52690b9bc74457b47bf2f72160364a501823100347c8ca281bddd02b6f1104d3fb4995765f37d0bd06f72dbb558082d743fe5d7a3c37933f6d433bc38ef233d3157d80de4ef4bd1ae7e810044622ff4fc3f8a49e209a574d07fe0c6ebbb1cd78afe8667fd6eda8918b822e3fc2bc858abdcd83807c2c788f7ff055069a193a71c5", 0xc4}, {&(0x7f0000000680)="f8434a617102eb5a2b7ec422b5b655df423cd42447c289c01e0e5a1448b8e12276c6f5251266a85af2815093f545211e228932", 0x33}, {&(0x7f00000006c0)="7743e6994c91676e0323e5e23ebcdb3a66dfc24029329260075d2128cbd7953583267fe8a392b03c9b9ec872a06640be187733a02e1ad4ad345a82673ae74e9e8742ad74b82df1d9d2ea0609f30af525e8ae8ce602a3b8365a7b865875e46118eadc66102833a1140d81035ed390aa1c3509d5c4a5994b40c3d7b52b2beda5af93edb08c7476cc7c97933aa7", 0x8c}, {&(0x7f0000000780)="f787140b26cb1f1ab498a230495fa56910edfd134f8d90be8c7d4b6acc11ebf19ad68c20928175e1d590a128d84263e2800fedb65b1c3f9f894524f1aa8dd04e763ee2c6320d4f1b34943e76b42a90fafce307ee0424cf7173708dd9", 0x5c}], 0x4, &(0x7f0000000840)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x2c, 0x2, [], [@hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0xc314}]}}}, @hopopts_2292={{0x58, 0x29, 0x36, {0x0, 0x7, [], [@jumbo={0xc2, 0x4, 0x58}, @jumbo={0xc2, 0x4, 0x2}, @ra={0x5, 0x2, 0x100000000}, @enc_lim={0x4, 0x1, 0x80008000}, @hao={0xc9, 0x10, @remote}, @generic={0x3, 0x3, "b69a78"}, @hao={0xc9, 0x10, @loopback}]}}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @hoplimit={{0x14, 0x29, 0x34, 0xfffffffffffff49c}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x32, 0x3, [], [@jumbo={0xc2, 0x4, 0x7}, @jumbo={0xc2, 0x4, 0x80000000}, @hao={0xc9, 0x10, @rand_addr="2ad0ccc626d62b2bed169aad2b4c2a45"}]}}}, @tclass={{0x14, 0x29, 0x43, 0x2}}], 0x108}}], 0x3, 0x20000000) recvmmsg(r2, &(0x7f0000000280), 0x400012a, 0x0, 0x0) 16:23:20 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x6000000000000000) 16:23:20 executing program 1: 16:23:20 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$cont(0x1f, r2, 0x3, 0x7fffffff) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x191, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4}, 0x10) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:20 executing program 1: 16:23:20 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x8000000000000000) [ 1663.772128][T20377] XFS (loop3): Invalid superblock magic number [ 1664.248702][T20407] XFS (loop3): Invalid superblock magic number 16:23:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:21 executing program 0: 16:23:21 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000280)={'caif0\x00', 0x100000000}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x100000000, 0x7, 0x7e8}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e23, 0xff, @rand_addr="f20bcb3b6bd517955047806befbf4fde", 0xeee4}}}, 0x84) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x61d6ff40, 0x10000) openat$cgroup_ro(r4, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f0000000100)=""/15) 16:23:21 executing program 1: 16:23:21 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x9effffff00000000) 16:23:21 executing program 0: 16:23:21 executing program 1: 16:23:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xff, 0x2800) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0x53, @remote, 0x6de}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:21 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:21 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xefffffff00000000) 16:23:21 executing program 0: [ 1664.920614][T20432] XFS (loop3): Invalid superblock magic number [ 1665.384832][T20455] XFS (loop3): Invalid superblock magic number 16:23:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x2e, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:22 executing program 1: 16:23:22 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:22 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xf0ffffff00000000) 16:23:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xa1, 0x8000000000101000) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000140)) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000100)={0x0, 0x3234564e, 0x2, 0x9, 0x3, @stepwise={{0x4, 0x1}, {0x8, 0x3}, {0x6aeb, 0x2}}}) 16:23:22 executing program 0: 16:23:22 executing program 0: 16:23:22 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000000ff", 0x39}], 0x1}, 0x0) 16:23:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000100)={0x38, "978714b61e966c71167d8f9d54a4ed4d607e655f2375a52b720def8b67034e0a714b89030f2f351468c8a90721b5f0962e02a5556f1bc54a2d697421011518fd5d232413b42063d766d224cacdffcb7e68095da2d1bdcc08e1a382eec8a7fceccdd55dd117124ca47637651df25a2001a4330e61cc830440a7eae01a80605ea5"}) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:22 executing program 1: 16:23:22 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xffffff7f00000000) 16:23:22 executing program 0: [ 1666.014077][T20477] XFS (loop3): Invalid superblock magic number [ 1666.348085][T20505] XFS (loop3): Invalid superblock magic number 16:23:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x34, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:23 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000000ff", 0x39}], 0x1}, 0x0) 16:23:23 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x20, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000640)={@rand_addr="b1efbc56fe76a683ef856f3063814cae", 0x49, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000780)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) pipe(&(0x7f0000000240)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@empty}}}, &(0x7f0000000200)=0xe8) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r5, 0x111, 0x2, 0x1, 0x4) recvmmsg(r4, &(0x7f0000007e00), 0x145, 0x3, 0x0) writev(r4, &(0x7f0000000380)=[{&(0x7f0000000a80)="8cacb7aca1f14f6ffc4a20be6a81417d50dfc1adcaa7e92ab3c19dd7cf8d07b3f239defa25909da447cb7b949f85e8f35b2c08520c871131dcbe94dfd2fbe94ba3817ca30c0bae99ad9d9b0b429f835dd7da0b0136a0539fcc1f3a30e320fc0385e027c38b5caba5cee35b862ce7cb19c21857d61578e922ed81beab0a9974a27dceba0b8d5aa32f2a92873eeebec482c495a750905b8a98a7617eecc0dfbd9129a83d8ec18a27a6b20f3e04532ebbebb7b8d36b904407de565241aa06f894"}, {&(0x7f00000013c0)="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"}, {&(0x7f0000000980)="4c7850907ecd636f48eb88c280b94fce8638b1105e5cb86de8f608eba04cc412b6971d24075e445af990a80dac4183b0fd03dd334e99a70af5c50fdc1208f99ae6e27e1ecbf1448944111bdf9c79119ac20d4b6b2ec4256ba96f805bd9c80f2949633545b5bac83786dc298a606411cb63986ba88bc74b197a7e640566dc13a0f4730c6642df53a4a2a7d947a067d58171913a232fe604cea24a6b28217657cdfe9103f3a176338c0a9bc4e363708fd31400bfd700c6383081258f410cd85a0db1531457b8f837ac8950e229ed0e60ae6e1c69ad7a3915b049a177b2bdc6813f3f05a98c"}], 0x2) io_uring_enter(r5, 0x1, 0x4000000000000, 0x3, &(0x7f0000000480)={0xfffffffffffffffd}, 0x8) 16:23:23 executing program 1: 16:23:23 executing program 0: 16:23:23 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0xffffffff00000000) 16:23:23 executing program 0: 16:23:23 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000000ff", 0x39}], 0x1}, 0x0) 16:23:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x1, &(0x7f0000000200)='#', 0x1) 16:23:23 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x10f, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x2df, 0x0, 0x13c}, 0x100000) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200000, 0x229399a12dd84139) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f00000001c0)={0x0, 0x7, 0x3f, 0x100000001, 0x9, 0x9, 0x2, 0x2, 0x3, 0x86e, 0xa9, 0x3, 0x9, 0x2000000000000000, &(0x7f0000000100)=""/141, 0x1, 0x6}) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x0) fsmount(r2, 0x1, 0xe) 16:23:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080)={0x1, 0x7fff}, 0x8) shutdown(r1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000100), 0x4) 16:23:23 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000007f", 0x39}], 0x1}, 0x0) [ 1666.973962][T20527] XFS (loop3): Invalid superblock magic number [ 1667.289946][T20559] XFS (loop3): Invalid superblock magic number 16:23:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x3c, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x3b, @remote, 0x4e24, 0x0, 'wrr\x00', 0x1, 0x9, 0x4}, 0x2c) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:24 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCCONS(r1, 0x541d) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0xfc27}], 0x1}, 0x0) 16:23:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x2, @in=@loopback, 0x0, 0x4}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:23:24 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000000ff", 0x39}], 0x1}, 0x0) 16:23:24 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000002000000", 0x39}], 0x1}, 0x0) 16:23:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1667.647259][T20574] IPVS: set_ctl: invalid protocol: 59 172.20.20.187:20004 [ 1667.671566][T20579] IPVS: set_ctl: invalid protocol: 59 172.20.20.187:20004 16:23:24 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 16:23:24 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000004000000", 0x39}], 0x1}, 0x0) 16:23:24 executing program 0: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x20071, 0xffffffffffffffff, 0x0) pselect6(0x16, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:23:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x4, 0xffffffffffffffc1, 0x378}) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1667.940428][T20588] XFS (loop3): Invalid superblock magic number 16:23:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:25 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000a000000", 0x39}], 0x1}, 0x0) 16:23:25 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffff54, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000001701000003000000000000000000000000000000000000001701000004000000080000000000000000000000000000001701000004000000050000ffffff7f000000000000000000170100000200000000000000219dd96b1cdda162e9d28549afe9a82b2566dd4efc5ad706cd4b9f7af802b97324398e45281a3eeb8031bbd020b5695dd9aee103e3400acd7723a27cc09e526f98ab4d8e318c79f6000040b9adc886ba273420e4a8500031ed9f1e7e6516b4344124b895ab5629dbb32d03bf575f2a31ae79ed91d4db648611d944b22d0c8d4944a900000000000000000000170100000460cf00bc17000000000000"], 0x18, 0x3}, 0x1fffff) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x408000, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote, 0xff}, 0x1c, &(0x7f0000000300)=[{&(0x7f00000002c0)="d9ae1b6b1776b0cf2d45d511a68335a015f64185981613aa621779340366b8d94ed256dfbc18bd14dfe6699b4c1f19e4f070eb", 0x33}, {&(0x7f00000003c0)="ad9cf8e444b0f2e951fcea71ff170bc581015839a955949577457a413eccf31ce8a89cc0f436f4f3f5399836bf6a0f141d8943d94898d8eb479f1a2152fb6ae74e2804ec0e096b916ec885a6cbac7794a492d87fb1d7d0a76826a73aa80254ba50f58cbf76995fba14cc78a1712e6157bef64d8cc097f415a96eb6a342bbe645988ae01b94d9a50b4fbeb937", 0x8c}], 0x2}}, {{&(0x7f0000000480)={0xa, 0x4e22, 0x6, @empty, 0xfffffffffffffffb}, 0x1c, &(0x7f0000000540)=[{&(0x7f00000004c0)="32310aa9a2279dd542423e06df97ec8fb53b19579bf04918de9fe6064216aca6de20c80b3785e18dcea1d98a39b01501543502d8d87056f2945a121fb1d8891ebd639ed5b4221ea3a4161010bfcc9673d0fcdff2f43b", 0x56}], 0x1}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000580)="7cc0434262ac1bff834795effba3767498a15708c1f0ac0688ef8fefeb325d8f87979f0d1f6441e2a2d03bf4242a333fb4c738008318af2936f2381009c8224bb6839e52690b9bc74457b47bf2f72160364a501823100347c8ca281bddd02b6f1104d3fb4995765f37d0bd06f72dbb558082d743fe5d7a3c37933f6d433bc38ef233d3157d80de4ef4bd1ae7e810044622ff4fc3f8a49e209a574d07fe0c6ebbb1cd78afe8667fd6eda8918b822e3fc2bc858abdcd83807c2c788f7ff055069a193a71c5", 0xc4}, {&(0x7f0000000680)="f8434a617102eb5a2b7ec422b5b655df423cd42447c289c01e0e5a1448b8e12276c6f5251266a85af2815093f545211e228932", 0x33}, {&(0x7f00000006c0)="7743e6994c91676e0323e5e23ebcdb3a66dfc24029329260075d2128cbd7953583267fe8a392b03c9b9ec872a06640be187733a02e1ad4ad345a82673ae74e9e8742ad74b82df1d9d2ea0609f30af525e8ae8ce602a3b8365a7b865875e46118eadc66102833a1140d81035ed390aa1c3509d5c4a5994b40c3d7b52b2beda5af93edb08c7476cc7c97933aa7", 0x8c}, {&(0x7f0000000780)="f787140b26cb1f1ab498a230495fa56910edfd134f8d90be8c7d4b6acc11ebf19ad68c20928175e1d590a128d84263e2800fedb65b1c3f9f894524f1aa8dd04e763ee2c6320d4f1b34943e76b42a90fafce307ee0424cf7173708dd9", 0x5c}], 0x4, &(0x7f0000000840)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x2c, 0x2, [], [@hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0xc314}]}}}, @hopopts_2292={{0x58, 0x29, 0x36, {0x0, 0x7, [], [@jumbo={0xc2, 0x4, 0x58}, @jumbo={0xc2, 0x4, 0x2}, @ra={0x5, 0x2, 0x100000000}, @enc_lim={0x4, 0x1, 0x80008000}, @hao={0xc9, 0x10, @remote}, @generic={0x3, 0x3, "b69a78"}, @hao={0xc9, 0x10, @loopback}]}}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @hoplimit={{0x14, 0x29, 0x34, 0xfffffffffffff49c}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x32, 0x3, [], [@jumbo={0xc2, 0x4, 0x7}, @jumbo={0xc2, 0x4, 0x80000000}, @hao={0xc9, 0x10, @rand_addr="2ad0ccc626d62b2bed169aad2b4c2a45"}]}}}, @tclass={{0x14, 0x29, 0x43, 0x2}}], 0x108}}], 0x3, 0x20000000) recvmmsg(r2, &(0x7f0000000280), 0x400012a, 0x0, 0x0) 16:23:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:25 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000f000000", 0x39}], 0x1}, 0x0) 16:23:25 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80020}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xbc, r2, 0x808, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf46}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x38539c45}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x72661cc0}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}]}, 0xbc}}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x62) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 16:23:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x7}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:25 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000060000000", 0x39}], 0x1}, 0x0) 16:23:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1668.869584][T20650] XFS (loop3): Invalid superblock magic number [ 1669.199632][T20681] XFS (loop3): Invalid superblock magic number 16:23:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:26 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$P9_RLERRORu(r1, &(0x7f0000000080)={0x17, 0x7, 0x2, {{0xa, '+userself:'}, 0x9}}, 0x17) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101800) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xffffffffffff8001, 0x20, 0x6, 0x1}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000200)={r3, 0x5b}, &(0x7f0000000240)=0x8) write$FUSE_GETXATTR(r0, &(0x7f0000000100)={0x18, 0x0, 0x3, {0x200}}, 0x18) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:26 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000a0000", 0x39}], 0x1}, 0x0) 16:23:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:26 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)="39000000140081ac00002c000520017a47000088a5896be845bcd1e04db73a0e92f0379580c54cdc7f2ec41960dbb7d553b4a421456b3d5df5000a00000000001d000000000000000000007223c73a38b841af1a634280d3c4e2c58fed8448bf64162532547330983ce8a81541e0a15f65e9fb101b1d9e8773f8ac782df9d0", 0x107}], 0x1, 0x0, 0xfffffffffffffdfd}, 0x4800) r1 = dup2(r0, r0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x1, 0x0, 0x1, r2}) 16:23:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2000, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'ip6gretap0\x00', 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4001000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=@delpolicy={0x174, 0x14, 0x100, 0x70bd27, 0x25dfdbff, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x7f, 0x4e21, 0x7fffffff, 0x2, 0x0, 0x0, 0x7e, r4, r5}, 0x6e6bb8, 0x2}, [@replay_thresh={0x8, 0xb, 0x4}, @algo_crypt={0x11c, 0x2, {{'cbc-aes-aesni\x00'}, 0x690, "2880d5821941b4487648af699c7d062e902e3c62099c1468f32f2b223cbda3e1767195f5acac6a91be81ae6ae4f622c85ca03cd329dca53ace3fe23b243d9be444a3f3422ac9ea09d1b98dc40bdd7c08bb283222f6e9f22bfb8ae21f3d41f42ad75c1b7932653ad93068a6cdd754cd32b966e8c6b2a0c4d7accad0a446bf647857bdb415a1cc5ee0456e28bca480ff6851b93d215c664aaa40b0906a99166ef068ea49346784fbf0d62c69f958ae3f29c6936a81df642c8b8eb701923560ec2bb1269428175fb125517f9f33db667d4dde72"}}]}, 0x174}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:26 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000f0000", 0x39}], 0x1}, 0x0) 16:23:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0xfffffffffffffd9b) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x1}) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1669.855753][T20713] XFS (loop3): Invalid superblock magic number 16:23:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x54, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:27 executing program 2: r0 = socket$kcm(0x10, 0x80000000008001, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:27 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000070180000", 0x39}], 0x1}, 0x0) 16:23:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffffffffff00, 0x101000) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000140)=0x2, &(0x7f0000000180)=0x1) ioctl(r0, 0x1000008913, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000000)={'teql0\x00', {0x2, 0x4e21, @multicast2}}) sched_yield() recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:27 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000731a0000", 0x39}], 0x1}, 0x0) 16:23:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000240)={0x2, 0x100000000, 0x6, 0x0, 0x11}) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000080)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80000, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000300)='/dev/mixer\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r3, 0x5}, 0x8) r4 = socket$kcm(0x10, 0x4000000000009, 0x4) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={r3, 0xffffffffffffffc0, 0xfd0, 0x100000001, 0x6}, 0x14) socket$can_raw(0x1d, 0x3, 0x1) 16:23:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1670.744723][T20768] XFS (loop3): Invalid superblock magic number 16:23:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80, [], 0x29}, @in6=@loopback, 0x4e22, 0x0, 0x4e23, 0x7, 0x2, 0x80, 0xa0, 0x3f, 0x0, r2}, {0x3ff, 0x9, 0xfffffffffffffffc, 0x6, 0x6, 0x5, 0x1, 0x8001}, {0x7ff, 0xff, 0xba, 0x3}, 0x0, 0x6e6bb6, 0x1, 0x0, 0x0, 0x3}, {{@in6=@empty, 0x4d2, 0x3f}, 0x2, @in6=@rand_addr="199198b11588dd03afc1b459c6e080d7", 0x34ff, 0x4, 0x3, 0x8, 0x5, 0x0, 0x67}}, 0xe8) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:27 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x101000, 0x0) accept4$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e, 0x80000) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1671.140470][T20812] XFS (loop3): Invalid superblock magic number 16:23:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x55, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) 16:23:28 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000003a1b0000", 0x39}], 0x1}, 0x0) 16:23:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:28 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="39000000140081ac00002d000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000000d9d5460b86de0f00", 0x40}], 0x1, 0x0, 0x209}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x8000, @mcast2, 0x80000000}}, 0x7, 0x17d8a0000000, 0x9, 0x4, 0x5}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0xfc, "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"}, &(0x7f0000000300)=0x104) 16:23:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:28 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000001b3a0000", 0x39}], 0x1}, 0x0) 16:23:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:28 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfffffdd9) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:28 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x14) close(r0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x4500, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000980)=ANY=[@ANYBLOB="29ee6483dc1f140d2a1feca045238a86fa8286d019530bd6f53b940c6ebc999ca7258fb6f77ba23ef3e0e87385303489655c4510483f2c19842bf6a32041d6ef3bc5914e9ff549db8a3d8b4cb19c5b8875a137d53955453d862f23ae876ffd4f7b15067e2b2fe94f6ed328f22fe8d7ce9ba84148211aa7825711069e06feaf0ca823ba273ad5d6adf9d1646dab16c995c7aaad8be6c5ed8da4d80f64bc519300000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r2, 0x4}, 0x8) r3 = socket$kcm(0x10, 0x2, 0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000008c0)={[0x2, 0x80000000, 0x5, 0xffffffff, 0x1, 0x2d, 0x5, 0x4, 0xffffffffffff7fff, 0x20, 0x1, 0x3, 0xffffffffffff23bc, 0xff, 0x4, 0x2b], 0x101000, 0x200000}) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r4 = dup3(r3, r3, 0x80000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000040)={0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x4e23, @loopback}, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, 0x110, 0x0, 0x0, 0x0, 0xd18f, &(0x7f0000000140)='ip6erspan0\x00', 0x7f, 0x6, 0x7fffffff}) 16:23:28 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000003f0000", 0x39}], 0x1}, 0x0) 16:23:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1671.749290][T20836] XFS (loop3): Invalid superblock magic number [ 1672.124276][T20868] XFS (loop3): Invalid superblock magic number 16:23:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) 16:23:29 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x800, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000340)={0x14, 0x49, 0x1, {0x0, 0x2, 0x2}}, 0x14) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x15c, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ifb0\x00'}}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x39af0062}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}]}, @TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 16:23:29 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000400000", 0x39}], 0x1}, 0x0) 16:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:29 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000600000", 0x39}], 0x1}, 0x0) 16:23:29 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000100)=""/223, &(0x7f0000000080)=0xdf) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xc000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000740)={@multicast2, @empty, 0x0}, &(0x7f0000000780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006fc0)={{{@in, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000070c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007100)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000007200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000007240)={0x11, 0x0, 0x0}, &(0x7f0000007280)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000072c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000074c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000075c0)={@remote, @broadcast, 0x0}, &(0x7f0000007600)=0xc) getsockname$packet(r0, &(0x7f00000077c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007800)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000007900)={@local, @rand_addr, 0x0}, &(0x7f0000007940)=0xc) getsockname(r0, &(0x7f0000007980)=@hci={0x1f, 0x0}, &(0x7f0000007a00)=0x80) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000007b40)={@multicast1, @multicast1, 0x0}, &(0x7f0000007b80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000007bc0)={{{@in=@broadcast, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000007cc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007d00)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007d40)={'veth0_to_bridge\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000007d80)={@loopback, 0x0}, &(0x7f0000007dc0)=0x14) recvmsg(r0, &(0x7f0000008280)={&(0x7f0000007e40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008140)=[{&(0x7f0000007ec0)=""/223, 0xdf}, {&(0x7f0000007fc0)=""/170, 0xaa}, {&(0x7f0000008080)=""/82, 0x52}, {&(0x7f0000008100)=""/47, 0x2f}], 0x4, &(0x7f0000008180)=""/199, 0xc7}, 0x40000000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000008b00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000088}, 0xc, &(0x7f0000008ac0)={&(0x7f00000082c0)={0x7f4, r2, 0x300, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}]}}, {{0x8, 0x1, r5}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x1dc, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x4, 0x100000000, 0x8fce, 0x6c8}, {0x1f, 0x8, 0x3, 0x6}, {0x6, 0x7fff, 0x1, 0x8b}, {0x4, 0x0, 0x4}, {0x0, 0x9, 0x400, 0x60}, {0x80000001, 0x7, 0x6, 0x46e}, {0x40, 0x3, 0x1, 0x7}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r13}, {0x284, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0xfffffffffffffff8, 0xffffffffdd3b4dca, 0x8b17, 0xf32}, {0x8, 0x8000, 0x7fff, 0x5}, {0x1, 0xdc, 0x5}, {0x5, 0x5, 0x3, 0x3f}, {0x1092400000, 0x1, 0x5, 0x1}, {0xe300, 0xa32, 0xc00, 0xff}, {0x2, 0x9, 0x401}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x1f, 0xf34d, 0x6, 0x2}, {0x9, 0x1800000, 0x409c600e, 0x5}, {0x9, 0x4ee, 0x42, 0x6}, {0x10001, 0x101, 0x86b4, 0x8}, {0x2, 0x10000, 0x100, 0xba0}, {0xfffffffffffffff9, 0x1000, 0x8000, 0x2}, {0x3, 0x6, 0x1, 0x2}, {0x0, 0x7f, 0x6, 0x9}, {0x401, 0x3ff, 0x0, 0xbbf9}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x1ac, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r23}}}]}}]}, 0x7f4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) r24 = socket$alg(0x26, 0x5, 0x0) bind$alg(r24, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r24, 0x117, 0x1, &(0x7f0000000080)="16b15bc5", 0x3e7d1a1cad0968e9) r25 = accept$alg(r24, 0x0, 0x0) sendmsg$alg(r25, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r25, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r25, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:29 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000018700000", 0x39}], 0x1}, 0x0) 16:23:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) 16:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1672.704477][T20895] XFS (loop3): Invalid superblock magic number [ 1673.036727][T20926] XFS (loop3): Invalid superblock magic number 16:23:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:30 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000100)={0x7fff, 0x0, 'client0\x00', 0x7, "e9c3cf8db75fc4de", "606e508cca82bcbae5ad544c01e1f6b49f21cfb509f747bb40e3724cb6b920cf", 0x2, 0x7}) 16:23:30 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000001a730000", 0x39}], 0x1}, 0x0) 16:23:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:30 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000400300", 0x39}], 0x1}, 0x0) 16:23:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:30 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000000080)={0x3, "779dc35ce028498c290317efe398d2ffb6bb698bac7ab296"}, 0x20, 0x800) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1673.640734][T20951] XFS (loop3): Invalid superblock magic number 16:23:30 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000c80)={0x9, 0x100000001, 0x9, 0x80000001, 0x9, 0x8001}) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x120782de, 0x401, 0x101}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f00000001c0)={0x5, 0xbeb, 0x5, 0x8000}) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x77359400}}) write$binfmt_elf32(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x3, 0x6, 0xffffffffffff537b, 0x4, 0x2, 0x3e, 0xe4b0, 0x100, 0x38, 0x376, 0x7, 0x10001, 0x20, 0x1, 0x200, 0x7f, 0x2}, [{0x60000007, 0xff, 0x10000, 0x4, 0xd3c1, 0xffffffffffffffff, 0xf7bd, 0xe1d9}], "3a3f01cf7f8d6697107543a9b4906a093818f902967e93fb7bcf70cd510b620694a42f8005ddf0144b04ca55bb02f8281b3a536f2e74a1b62fa1248a27ea98befeed71e7774fc100e48e315f7d12b0824e9d0e69172d1eacaeda55cdfc568e8200345acae141564fb7dd3c92c9df6ccc61fdf52d288110e9daf0a29b4a384a522f9d0dc989edc37fc781a9ea91b987d97337654f532c27df2fbe57d400f86a03b6558bc77711761b585fc68e2cf1acdf336c48540654f85b4d19fd6aa5112adec5e544879b427eae97ab6c1daf4e8b81d55f071f78ab2695fc4d5f2e132141c8bef135029aec32482b52977c23c64c2c03794afe5362b1427a", [[], [], [], [], [], [], []]}, 0x851) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ubi_ctrl\x00', 0x400, 0x0) 16:23:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:30 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000034000", 0x39}], 0x1}, 0x0) 16:23:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:31 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) modify_ldt$read(0x0, &(0x7f0000000180)=""/63, 0x3f) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x400000) getsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f0000000100)=""/112, &(0x7f0000000080)=0xffffffffffffff55) 16:23:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:31 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000001", 0x39}], 0x1}, 0x0) 16:23:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:31 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000002", 0x39}], 0x1}, 0x0) 16:23:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:31 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = socket(0x1, 0x3, 0x80000000) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x4, 0x2, 0x3, 0x52, 0x0, 0x70bd29, 0x25dfdbfe, [@sadb_key={0x8, 0x8, 0x188, 0x0, "1d4652f183cd0222641aa276e334213cd9ece98d25a8577f7fd1a5d21e7411d4aec0614374605ba7bf34f4c4cdfa43a2a4"}, @sadb_key={0x18, 0x8, 0x588, 0x0, "989b5bafde1db5d6e377073c52801988c2335dd7d989d9ebe7e2022835418a27850f57e8764c131f3bab65b0b3ab64300e7ba7f7b96312c8f3460fd1a520f9b825a01dc999496596cd9bd111580e8847eb957073c322884a6bcb50c5d1c2697566840747ea358e2856a017a2b285edbe9efe7cff83d12382e74d5e08ca51d825403c76d31e81f77e34788caa98ee5c12475bcd5239aaa802f02b75840ab33cedc15b922cd5d4f6e50a3b614ef8683d6b18"}, @sadb_x_sec_ctx={0x5, 0x18, 0xffffffffffffffe0, 0x3, 0x1b, "2c0d60278cda20846cbbde8443732434729a96eeee3497a12ad80b"}, @sadb_x_sec_ctx={0xa, 0x18, 0x400, 0x8, 0x43, "948f8c66b76b4adf8d05d3ccd387c9d21332a463c9588b2fa03f190beaaee49d9616be93e410d62710660e304ab19995fd292c380f8d006e755c99bd2a6414077d47c3"}, @sadb_x_filter={0x5, 0x1a, @in=@remote, @in=@broadcast, 0x17, 0x4, 0x10}, @sadb_key={0xb, 0x9, 0x268, 0x0, "387055e9fcfef2e3d58e9ae58bb4a92b0e3e0254201ced75b8b8e67883a48d75bdfec7433fe09e99ee779168e51c617ea74ba8f7727970255575f7699077d324e037e50c82d630f20e92a8738f"}, @sadb_x_sa2={0x2, 0x13, 0x10, 0x0, 0x0, 0x70bd2d, 0x34ff}, @sadb_address={0x5, 0x17, 0x3c, 0x80, 0x0, @in6={0xa, 0x4e24, 0x7fff, @remote, 0x1f}}, @sadb_ident={0x2, 0xa, 0x2, 0x0, 0x8}, @sadb_x_policy={0x8, 0x12, 0x1, 0x0, 0x0, 0x6e6bbd, 0x1f, {0x6, 0x2b, 0x74f, 0x4, 0x0, 0x3, 0x0, @in6=@ipv4={[], [], @remote}, @in=@multicast2}}]}, 0x290}}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 16:23:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1674.504341][T21007] XFS (loop3): Invalid superblock magic number 16:23:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:31 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000004", 0x39}], 0x1}, 0x0) 16:23:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000013c0)="8dacfbbfe493a816a857e40817ee1941b9c0fb3f5ebbf0a882c487348e288c0fe975e49fcaaaa46cc95d57e59667f4d28eb9b373d5bffbef128d9c417bfc875a50f01dbd8d165d1755d99c831878c5f7a0efdfc504b1095891ee36e8d2796f07870ae24cff5daedca95fc2f43857b1d2bc6b857b76340d4d51988a238d7d643e42340316ba40ae9dc6827fdcd3bac39239c93da21cc1a0dbe78c64c8879c26958def03b388ba528b085241cb7e298dac587aca18cc1a93e51235a3597ab05edd861da963dcecfe550caad509333c24aac5fc031f712848e75f9fb784b8b2154672fc5ba1ecf2da6a5be2c6f79c4b92fe5915858fce1b1c82152f0ad90e8d3116ca05dd440a9e68924800e5e0f9cf64267890427953df0e778775a9ef6b1d83be7139c5d9307306f473d87f8a2db643c66258a4584181da46905384417e5466e14375300234d6a48a20710aaef2fe4a2569ba084adc39c4386d22d5f2119b79fa526ad0211b5368e79523b716559fda6cfcb533635ce9389e7f44aafa3f8a864fe086f4723ff5fb8ff63b2944aa66f19ca491872f3d996f6cf49a827847d771191d00404f18371900a176b9567467d092dee2f658abe3086c8873f852f65cee73f0e0160d977ab13f512fe4f2e5fc85bde4a596558972e84cb43bbdf74afbfa16dfc796ef51b9539b7fdcc37dd1e5b68e91704fbe522e6caaa05063c5fc77859028ad3b99f9c9fd830018851bd07201a57c45e10049e100eb826fb8f83f74f060c4b8ae8647c630cef2960a4dd05953ea4c9d81dfafbbef69dd0ea68747228056fe7ca57e349b3f282081ec1738551d9b3efa19375a52dbfabc7000d0da007dd8d1647aecdd84506c90522bece12bdd33ba4da92fdd0bfcebab1d58453ee1aec4e1e154fe0d015501fbd62a4061335d150893f9ca313be40e1c927da54132c1428cc14f15459bb1c545911e9bf10ccf1109fdc644002190aaeed85e8bcfe46e579dc02ff5b559bfb1cb4b6831a9a82fabde765c8c42a5c702d7dc53716f4a3ac7f2e8bc5195370faece341891b20e8e34df1d69b2b0f1943a27e3a44a1af77a447d9523d779a5ba75fde11ce2ee8a24de0af2c608b38cae10b9a37200cb2e4f88c325a9bdec48370c965779eb34631fb65cc7d71fae90ad8f6da91bc300e6a0c6e6a83e6dd28a264a4ca30643d3da20da6c830c7499501d55572a5afba46a6be7a01b3f23d6c2e423faa150faa03f26f56913ddcdccecfcd7e23941970a64e94e6d8026daa3e3006fc32ba786fc82a8111c853a957fe847e6558018a995c815a18a39962ea0d5c5047f264170a48c572afc950b2b4f0ad31fe71b8330366a06217cda1fe198680825cea6eeb32aaa506b0cd0248cdfeef83ff67645a7bb30f70f31d2e89b823d34be3e0120fdd761e6df597a17faeb04a4034951ad5f682328ab351f6c82eacaf135b0e03919b2ea8a582774edcfbb811143e8f534133fdcfd14be21005d8264cbff409d9557fd50ec332d5a7a332fd594eb48544fc4e72f7aff7ef2b729d8012c2c6c3027eca8b77432363667919c3f34c69bb06903bb586a4887a81c063d97d41e6edd452a6da60fe72c811c8805d6ae6793b29a906f909febae179a2593fcbaee6eec8711f15e4f36ecee5fd696924dde7e6ab3eea87cd9a68dc1036e30be106868429751feb263539ca471f0807bd0817580f71c702164298e7681e9b09f7763711308655b149ec16f2609fced9454b44227ec2d95d96e324c60cf328d35eff41620b6a7da194500a32b9d1ad6674c5051bca7623099a372a0a98f5d959ccaea9468ec9e6c383431a9fb646ca37b75e00d0f6c09fd204227195669a3297a32dd8e5026ddbc6e88dc8b1aae42024a67a3db930f05a13817de1be9ab0f6b3e84622060e601d275645a1ce7a5681a6d3c5410107b42e323fbf2c75a0de13656b431a7b892578ddf36753b4db0cf93eba78dc1e0dd1059bc2ed30dd63f08d03ce345bf0c9ecff48e47fcb2863649b5408c279889b088f8922436df2b5b3260bcdc9a8284ad86c8c95645299a359dbf4e146893c23d3cbb6999046fdbc847b3659fca23c67b975c9717cd3c6b444ed5ac77599db3aa13ca45630b419500ace0ee0417dfe9ade8af3dea8bb786f64e1ad51b45742eca4b6fefbad03939593def9c6bcb77932c4bee87c3a008acd5de6769bcb205189823097359b10bc8dcfcd5aca04486fcc397b44e8c4ff83de2489121ba2953d3f8e20eb37ebaaf73b630803609a6a5fc91e7678717715833e396140f42ceb4cdc04f24fb21997a896990330ca2ed34492a2d2c6d7c2267b429c862479a9c27dccbd1348bf4f5963cab33345febe72b5737da6045f05c2d87096ede65282b990ed086ff6e8dc5ef6aaf0f4be26df858c075583f6cc45a6c47bcf8719582784aeb8768df3212deed46a07334946d8245d8edabe3ca51c6858b63cd1e62cd327dbe56ea28fb82c5e5d790d74a8f9ae54625c59b71197b4ff9a16c963f2dcc838192d8566589e4784cbbf5260d2a3d84870c80c8fed2435675ab2adab9bf1ee14c6eaf9c6c53b151178a95857ddecd2ec50e7ef437a734c8d715c4ca912960e26b722958702280d8b0c76f6f7d8116d04a0a7bd3fb53b421e54c8d8d97cc875a624c5ec1800afab71ae8907933def9d736a06c2c87592ccb95def60d0ba8ecb0fca153284e6f959578d0585343952528ed4eb98840bd677f10457ead7d9c02c67a3a5dd81278240c46d89774ad63c7498c7f0fa3fc64c8aaad94d3ca7c87367d09d402587b3a5f8bb57a28f34e25c72a30dd43154816a74e2b9e16335edb212e6223e94668129d5e9dc494340a01a78c3f1c8d4a786ff8354c1b204618d6b7326ef6adbd2d954f5a7b55d3cd521cc84e072f19a01fbcce0d128259b4752192d046c5493b3297d6b3313df2dd40588a42a7c7060b348421eebd5bd86a31f4386ae1702148399ab2765ed7c2a4b8964140cc195bd9965bad375fa6158a4599c68aff1455eac3b624ee5b3f8a7d290398ffee8e984d4943ab0264efc6f8e2f090ffefcec3759fe00a389371dbcbb9abed73acbf380776dabe8dd35b19e975fdbe78fce531c83cbe7716f2c775fee48742a8c30b22c4602aea7d3f2a6fac83ef317c164cce349e1dfd4333172406d61f746ac734022fc6f75dc640de428a3be8c2ef06fcae78a03c0c3e8ad6d14a924ac24d869afd4a8c586ecbe6a6337399332c409b0fa28db80634e7a0fb2b6c2886cf10f2e34eec2af2f0bba1374d4562d59412398f98f9d3329abc54b3f68d48e2a3d8a934712c06845e5c3f950b103f0d8b0800fdb22e07b74a06c54e3322facbda7e90a60b9361b4eaac18ca6e01d28419c2d3a46fc0627ad3faf354cd23b4821d4d977fdc53bd060c9999851a433d48e4e46e9d2b05a0fa95c28cf97544d7af1e560e6ec2fb1dd4a9e14d583c6df51a8e58e5d518a92af6b36e5542cb976a8bce088277b82c1cf0df5c6280540dcb6ce2a5f522cca2ce5be20565d0a3a28a7dc6681c8378558dcbe99222292430afc3cf710c1a5c509e5b8dd697983286206011af3dc084ef3508bb1c8308844fe795113c88e37210c3b065b5a47e1ae0d6617cb8c0aab39ef181b0e17b73c6a7f45e03d8e4f53cca268a7da635ca2b9c6a2affc5ef7da5e00f7b80c65a6ae754686a1105fb937bd93ea4e3fb21d4ca1612e799ca248e472a9effec9622e6944bf9b2fe48743d643929b10f6501eb97c01e9ad221f2ec458f7c3087e67d4c09424447536413e0ba0feb94ba3ed68c635a9cc78a8bac74a96089c1e8521e6464a6390f1a00c62fb6fc95d04b08b910fdf403365a5b7241aeae04d82e12146bcd10313116cd1cd8627be340de3a9cedfd7e11636bd0348d7016e67a5d46f42bc886931b7db636e0f9183698037d04fdf5dedc9c367c314522d22b5de96031b182a784ded90d956e88c0adac1eaee3f90769d6293ed448aaa7d33bad2da4df132a9ed008dd93058fde51bcefc4e4f8a07a9cc669c9ca0de62403c28351be84785566852d1906c29ef5461d1bba0a9c2bb57a9f2bb797a0f9dd0732ad6fcaa2544764493e2834dac61b0031d2e68d924d52bdd2c9c2f12cc3298e2b196cb19d4e31fa96b3ad0cb18ae518c116ecdc9a73d95225e71ffd99840cc1934af0f9d3e29da36827d08b895ea3b117d3c7aea051875e72138daaa7d2c318b17f7c63d22712cf781cf92dffe1011028d8d32167e18e81934f7fad4cf92c1f82f0d977c0b6303ac7f548da6e609210117b3cea406970a036b2718b24f9db16ede07a51d5406aeaf86af51c5149ee4cc8decb3fa3fc49ed3252e75c854e9ba4b18d09812e3807d2d5b8cf33f7154c762e1db2927583b6b51c9670fa167ee56c1da582e60e1dd1295f96dad6e56937c25f505ae857b6fe75c796dd57c6468d2a4ed8383e13217b9c0fb068407b1309a1b897621348bd351ec5c5f7e8df8d640c81e2b4620058f5471cd5a1a7e6698e5018a9bfa27cc8ea9c2596789d89566af59442dc474681c842bc36ed1a90145e4b65764612ce9ef8af8a01f2f419d08941b00469e994359d8111705c02e80b0becc9c1e57d4f6ae8306a4b3eeb1a45717d41b0be516e7124d2c9e7b4928d070818b33d2eb0042311cc025181f44e17c01cd2f9cd5b4fa410a9b050b238bbdbf571e638e83362d2356e2153c5675d00f8f324f7f1e0aa700d7b1e481f0335e7ca7ee48fc8a66e2cb61836418903c1672b33f08c63a7be3e0949d19a4da7db0f961b04202286e403fbadc695120b1b073b622049b08b9ada5e8353a1a472c64e073bd76d871b371b8a51c64d84b0ea22e6454ee53c4227735b0527a358fd78bedf21fc46c6ad037bf4bcb0e6a0af8e0a6d51d46968441bd12f6fc93f9c3a3b7f9d87114e4d7973fbfb676e74ce8d146e1c90f9d540e866150241eeb236ccbb35d0ba139791fb37e7f26f4ad36289c511993706367382cb80657ee31858ef75005d32942e8c59c548c34abae9e54e179ac89b63a4360293a1c779f4d3dd0a52f1c8d8ef9aa86eacd70382bd3dfb5a0a7ef3a7f1629cbb5a74a2ad8b1b81c5485e1020cbf81859c239f2a0ca9df66cfc61074d6fbe07885d9f677d0e7e1bf76353783cae2d77a3112fde40fb422572a1b72584fc7e72f8c74feef418bbb264550a540441eb885488e4c790d53afd29c162f3b8c9e0efb6533fee600a95817cc6379915620178b1c5de28789c989e6f7b5d2afcc67e2dd4cbd4a454528abc8518c5cdcca12e52bffb1a46f605a6976281c9aaeb60498c619aee970b18d6b449a01e0fd4285ce989a69b34c707e59b165a1f42529dc8fa92532c2e0f44ec7a48f25462b2e1c6d8ef4ab51c8b145cb5e246e0f6f2757175d3da8d8b7f81a804766275e62e12a9b604a08b50517be6c7f7dbdc3279dc59833ca34a5814f31a40e365166bbc68d6e0eb2642a50df9c9069c0ab9dc52d18a4987cae70cbb887f2f8373057aba8a9d6f0bac6e6c6acf8f726a0f23704a367c88c64821d98e90ae7be14e97280cbce4b2d4cbfcbd1048de220f644dfd79fb33cc33c5955fe5d9f53e32108ce1d84891875ee20a5724a1949842e3f26a8aa1c5a937efcf27fa12ea3f797e11792f1de90412d8c6826bea6596d78c5428ed1552baec995a9d9a98a9195db189048159e865c47c25405e599c879e6c87635eba649e10fc01a15b6b60e213d43a413e996376fe0e48e8dff5e59b09535fa5361b490bf3c07a25e6cab097f061e3680740c2eae9", 0x1000) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) ptrace$poke(0x4, r2, &(0x7f0000000140), 0x2) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000180)={@rand_addr, @multicast1}, &(0x7f00000001c0)=0x8) r3 = accept4$inet(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000000240)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000400)={0x0, 0x3, 0x40}, 0x8) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:31 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT(r2, 0xc048ae65, 0x0) r3 = request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='/dev/kvm\x00', 0xffffffffffffffff) r4 = request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='wlan1vmnet0\\cgroupcgroupppp0\\^#\'cgroup&\x00', 0xffffffffffffffff) r5 = request_key(&(0x7f0000000380)='cifs.idmap\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='/dev/kvm\x00', 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000480)={r3, r4, r5}, &(0x7f00000004c0)=""/166, 0xa6, &(0x7f00000006c0)={&(0x7f0000000580)={'sha384-arm64\x00'}, &(0x7f00000005c0)="0fc45461d4fcf7e7c6a828a5f4e62c6b4388a5dbcaf6bb3516d77960cfb55e66aa1778c25d28ed85d0106ad03ce6acfb6bd0c248bc522052fc2e0623f550dea22a3f7e5515fd366d2b80aceb1fdf79af3230c30dc5efe9feaa71d6786fcf26155604e4b6ccf41f355b82faed4f9d0350d41cf42af7d1fed3fae903697a764cadd20d14bbdfe5b5bd1304709eb5502dc5d0bdec18f368fd9552b2a349fd43b709454fd512d9ae734cc9cc2e3f80c308419f728011e9680765e03cfb4a74b0a4e2e63eb1afdea33810692e8a900eae44a963b7", 0xd2}) r6 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3f, 0x0) statx(r6, &(0x7f0000000080)='./file0\x00', 0x400, 0xfff, &(0x7f0000000100)) 16:23:32 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000000a", 0x39}], 0x1}, 0x0) 16:23:32 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = shmget$private(0x0, 0x1000, 0x400, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000100)=""/105) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f00000013c0)={0x0, 0xfb, 0x1015, 0x6, 0x619d, "e467a17c8a5fe9a781c35b8e26df8b1d", "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"}, 0x1015, 0x1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x80002, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L='version=9p2000.L'}, {@version_u='version=9p2000.u'}, {@version_9p2000='version=9p2000'}, {@nodevmap='nodevmap'}, {@access_client='access=client'}, {@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}, {@msize={'msize', 0x3d, 0x8}}, {@afid={'afid', 0x3d, 0xc81}}, {@cache_mmap='cache=mmap'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ecb(blowfish)\x00'}}, {@subj_role={'subj_role', 0x3d, '(\x87.Gsystemppp0ppp1'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@subj_role={'subj_role'}}]}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r3, 0x0, 0x0) connect(r3, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x2, @multicast1}}, 0x80) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0xfffffffffffffeee) socket$alg(0x26, 0x5, 0x0) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:32 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xd0, 0xbb, &(0x7f0000000100)="c7be529da966121bbc0de18118b883d13e32f0d301c7fff62322c1b92d2e1305e264fbf8edde30809db44a9368e2d791fabf2b0689c73fe25ebed428a507597142642c8850ea86252b56cf3a8f4ce63e5fd39253e79ac24b79556efab9dd63779480d0f4d462a65b945231ba5111d8973fd74fe63e04ef3482eab25b75cd0a5c074379886f6854ed2cdf854e10347e1288bacb0d3ce91b1590476884eaea3802725f88e434aa442c7517a71d6fd5048bb5a43d294f59325a46fc3ae41a9e96da3eafdbe4e0f0978953bb3bb2f3ae0500", &(0x7f0000000200)=""/187, 0x20}, 0x28) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x80, 0x200) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:32 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000000f", 0x39}], 0x1}, 0x0) 16:23:32 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1675.389648][T21065] XFS (loop3): Invalid superblock magic number [ 1675.840606][T21103] XFS (loop3): Invalid superblock magic number 16:23:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x70, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x3) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfffffffffffffefc) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:33 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000001b3a", 0x39}], 0x1}, 0x0) 16:23:33 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x40) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000200)={r1, 0x4}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r2, r3/1000+30000}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000002c0)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400080, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000140)="e28aae1d6fb8af29c4e49862f1c7d653c427f294a59120399deb4c4efa74d408de58bcb779f70c80b6edc16dcd082708b51cb32d6d756ee85e0a70271ac34536d6676f072f4b27a8cef2", {0x7, 0x0, 0x3376775b, 0x5, 0xc04, 0x5, 0x5, 0x7}}) 16:23:33 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:33 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000003f", 0x39}], 0x1}, 0x0) 16:23:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000003040)=""/4096, 0x1000}], 0x1}, 0x7}], 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000002000)=ANY=[@ANYBLOB="1000"/16], 0x10}}], 0x2, 0x8000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) fsync(r3) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:33 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0xffffffffffffff1a}], 0x100000000000001a}, 0x0) 16:23:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1676.419469][T21129] XFS (loop3): Invalid superblock magic number 16:23:33 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000040", 0x39}], 0x1}, 0x0) [ 1676.816436][T21164] XFS (loop3): Invalid superblock magic number 16:23:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:34 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = accept(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) fcntl$notify(r1, 0x402, 0x0) set_tid_address(&(0x7f0000000140)) 16:23:34 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000180)={0x6f, {{0xa, 0x4e23, 0x1f, @mcast2, 0x7}}}, 0x88) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x0) accept4$x25(r3, &(0x7f0000000100), &(0x7f0000000140)=0x12, 0x80800) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:34 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000060", 0x39}], 0x1}, 0x0) 16:23:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:34 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000001870", 0x39}], 0x1}, 0x0) 16:23:34 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2802, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000080)=""/59) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000100)={0x3}) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000180)={0x101, 0x1, 0x6, 0x0, 0x100000000}, 0xc) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:34 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) timer_create(0x7, &(0x7f0000000140)={0x0, 0x18, 0x4, @thr={&(0x7f0000000000)="d93973b59eb0df", &(0x7f0000000100)="8cada918cbeb59849b0b3391bc1beb145770e5b4662afb"}}, &(0x7f0000000180)=0x0) timer_delete(r2) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="6436ecf52713b7e0826cc13d9458b275a7", @ANYPTR, @ANYRESOCT=r0], 0x34) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:34 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000001a73", 0x39}], 0x1}, 0x0) 16:23:34 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x1}) [ 1677.440453][T21192] XFS (loop3): Invalid superblock magic number 16:23:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:34 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:34 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000ffffff9e", 0x39}], 0x1}, 0x0) 16:23:34 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x204080, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20040, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0xff, 0x1) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x3, 0x7f}) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0x10, 0x1, 0x8}, 0x1}}, 0x18) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:23:35 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000ffffffef", 0x39}], 0x1}, 0x0) 16:23:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x0) ioctl$PPPIOCSACTIVE(r3, 0x40107446, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x2, 0xfff, 0x9, 0x8000}, {0x80000000, 0x8000, 0x7ff, 0x5}, {0x100, 0xcf91, 0x6, 0x5}]}) 16:23:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1678.385414][T21256] XFS (loop3): Invalid superblock magic number [ 1678.781487][T21283] XFS (loop3): Invalid superblock magic number 16:23:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x7d, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:35 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000fffffff0", 0x39}], 0x1}, 0x0) 16:23:35 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e20, 0x100000000, @local, 0xeaa}}, 0x10000, 0x75, 0x8, 0x1, 0xa}, &(0x7f0000000200)=0x98) 16:23:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = open(&(0x7f0000000000)='./file0\x00', 0x204400, 0x80) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000100)) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000140)=r2) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000240)={0xc, 0x0, &(0x7f00000001c0)=[@dead_binder_done], 0x6, 0x0, &(0x7f0000000200)="6b74a9001d83"}) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:36 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000007fffffff", 0x39}], 0x1}, 0x0) 16:23:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:36 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x335e, 0x40000) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)="cefa5f12bf8db7ec4156d246713e1dc66384cd63678b126d03c8bfb8c321ca9062b0872c99d90edfdb59994ae4d231672e82") sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1679.364089][T21309] XFS (loop3): Invalid superblock magic number 16:23:36 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1679.728668][T21341] XFS (loop3): Invalid superblock magic number 16:23:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x7e, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:36 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x40, 0x0) getsockname$unix(r1, &(0x7f0000000280), &(0x7f0000000300)=0x6e) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r2 = socket(0x17, 0x8, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000040), 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000200)={r4, 0x1}, 0x8) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000140)={&(0x7f0000ffe000/0x2000)=nil, 0x92c, 0x4, 0x30, &(0x7f0000ffe000/0x2000)=nil}) 16:23:36 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000009effffff", 0x39}], 0x1}, 0x0) 16:23:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14, 0x800) sendmsg$inet(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="74509b28462580a818456542e9787c13bb86aa8c8c11bfb5e1d8361dd7367a8fd548a360b0a48d92dd787dd94bd2517ae49c0e6f464da849a1d8abb6fbbbbfcd6b56", 0x42}], 0x1, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0xc0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10081, 0x0) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:36 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:37 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000efffffff", 0x39}], 0x1}, 0x0) 16:23:37 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc4106(gcm(aes)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x6a8d) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:37 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:37 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1680.318663][T21364] XFS (loop3): Invalid superblock magic number [ 1680.733743][T21411] XFS (loop3): Invalid superblock magic number 16:23:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xc3, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:37 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000f0ffffff", 0x39}], 0x1}, 0x0) 16:23:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:37 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xffffff83, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x1}]}, 0x40000) 16:23:37 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x2, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000001c0)={0x3, 0xf2a2}) 16:23:37 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:38 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000100)={{0x1, 0x48, 0x2, 0xfffffffffffffffc}, 'syz1\x00', 0x4c}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000001c0)=0x6) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:38 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000140)={0x969, 0x6, 0x0, 0x1000, 0x6, 0x4, 0x800, 0x4, 0x4, 0x9, 0x40, 0x1}) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000080)={0x4, 0x3, 0x5, 0x20, 0x3f, 0x40, 0x6}) 16:23:38 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$RTC_AIE_ON(r3, 0x7001) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1681.313453][T21437] XFS (loop3): Invalid superblock magic number [ 1681.665124][T21474] XFS (loop3): Invalid superblock magic number 16:23:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xc4, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:38 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:38 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x80000001, 0x8400) getsockopt$nfc_llcp(r1, 0x118, 0x7, &(0x7f0000000100)=""/147, 0x93) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 16:23:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 16:23:38 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:38 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0xffffffffffffffff, 0x3, 0x10001, 0x1, 0x6}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000140)={{0xa, 0x5, 0x100000000, 0x4, '\x00', 0x9927}, 0x5, 0x10, 0x3, r1, 0x3, 0x3, 'syz1\x00', &(0x7f0000000100)=['\x00', 'ppp0(+\x00', '\x00'], 0x9, [], [0x0, 0x4, 0x7, 0x7fffffff]}) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1682.238636][T21499] XFS (loop3): Invalid superblock magic number 16:23:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1682.560394][T21532] XFS (loop3): Invalid superblock magic number 16:23:39 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:39 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0x2ae}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6, 0x200) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x121100) 16:23:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffd77}}], 0x1, 0x0, 0x0) 16:23:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xcc, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:39 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = socket(0x5, 0x3, 0x200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000940)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000c80)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f0000000c40)={&(0x7f0000000980)={0x2b8, r3, 0x808, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xbe6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x67ec}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x21d}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_MEDIA={0xe4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffe0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5ae6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffe1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe013}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x87fe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xe4, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7ff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x3, @rand_addr="93cf7ee076d0eac3409ae904de25be31", 0x46}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x26}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80000001, @ipv4={[], [], @broadcast}, 0x100}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r5 = creat(&(0x7f0000000cc0)='./file0\x00', 0x60) ioctl$BLKRAGET(r5, 0x1263, &(0x7f0000000d00)) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) openat(r5, &(0x7f0000000d40)='./file0\x00', 0x4001, 0x1) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)='\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f00000004c0)=[0x0, 0xee01, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01]) sendmmsg$unix(r6, &(0x7f0000000880)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000180)="93989a440ecf2495fa4216ec480b43c9d821178c091ba0612b531bcbe6aeeaf899f8a3fbcf42d3c8d0b7b8b7da0a05596beda154dd01a1d49947cb74988a915ee80d1f99099b6ee79cf8beedb106e71b38771490b89589edd1c2fc1539041fd52f28c00538f3085f1c1ac9a4fde82a46f105187e35a6bde76c5641efe061290253bc6962377309521d628f0be33e8e4009bffef6b5df38df6d64e05ae55867d21c0febf1a6", 0xa5}, {&(0x7f0000000240)="4cb35bfd", 0x4}, {&(0x7f0000000280)="8b7b2623eb7722db2127177f5650bee38b18911b50fda9e474f743f3d8af639b0b394a6068e986050187ca4bfb5d2d9b7ea602a56a8a", 0x36}], 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r4, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r4, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0x40000}, {&(0x7f0000000580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000600)="0e481d56f915e1a7db5a4924bff3c19bc38b8b55a6a35b89354b4a7837e9fc9b896fd8f781cc0cbb9f1fc77617b2f112a21a7981ae5eac0aab2a480cf234b47b2cbea4ac513bda0e9bcab6e1c8555e35b58f14dff58506368561055f2c026f27ef16a4ed9d79dc3a3d16995844db5bad0a2483e82e1f8e859b073618fc7f60ca0ec374dfe8a500b65fe9cc193f", 0x8d}, {&(0x7f00000006c0)="8195468b0f40bc661583dcff0fe1c3b63c833df93380ddbe96c78b4bc2dc2435416112f761ac4c7e5d2b1c3a6699a3117c6d031cdca186c115eeca70daa4f239c9387f930d9a0766bff804eb1c356e061652ba3b0effcfa1da506dff9edc4378025290aea0485ed5c68fd1d1b6ca", 0x6e}, {&(0x7f0000000740)="6acb10ad2592c04d85b20a7611cec961d618d40fb0efebac35c536c514d0c33c9725d2211a3ce51a93335898d1f39709700cd1b56e7d12a2ba573f8aa86b879c8feb3c7dc498b02a815970cdf76ca8838bdbbe76f639c338e2bbbbf9478a05f39cfb6b20e466686087b4c1c88e3ae3304233077ca95d1bc87e1f58563b913be5ea91e7c98904e7ec6e234504ee25624f1310283be5d149ecea64f23c2a177249a2bd5d0b65907a4aa09c6d1b60de6d9bb17a81ed", 0xb4}], 0x3, &(0x7f0000000840)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r0, r0]}}], 0x20, 0x40011}], 0x2, 0x40000) 16:23:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000100)={0x1, 0x1, 0x7, 0xc67f, 0x234}, 0xc) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x10001) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x5) [ 1683.172668][T21556] XFS (loop3): Invalid superblock magic number 16:23:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000000)=@generic={0x0, 0x8001, 0xffffffff}) 16:23:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:40 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:40 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000080)={{0x1, @addr=0x783}, 0x8, 0x4, 0x7d7}) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000100)) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xdb, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) fcntl$dupfd(r0, 0x406, r1) r3 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x1f, 0x80) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000300)={0x7f}) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:40 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:40 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2240, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x800100a, 0x8, 0x1}) 16:23:40 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:40 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x8200) write$FUSE_POLL(r2, &(0x7f0000000100)={0x18, 0x0, 0x2, {0x1}}, 0x18) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:40 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1684.107753][T21626] XFS (loop3): Invalid superblock magic number [ 1684.511101][T21656] XFS (loop3): Invalid superblock magic number 16:23:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0xe6, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:41 executing program 2: r0 = socket$kcm(0x10, 0x7, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:41 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:41 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0xfffffffffffffffd}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:41 executing program 2: socket$kcm(0x10, 0x4000005, 0x4) 16:23:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:42 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1685.088132][T21679] XFS (loop3): Invalid superblock magic number [ 1685.479515][T21709] XFS (loop3): Invalid superblock magic number 16:23:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x102, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x40) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000140)) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$SIOCRSACCEPT(r3, 0x89e3) fsync(r0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:42 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x5, @empty, 0x80000001}}, 0xfffffffffffffff9, 0x3}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000200)={r2, 0xaa6c, 0x3}, 0x8) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'teql0\x00', 0xffffffff}) 16:23:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:42 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:42 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:42 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x2, 0x800) 16:23:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x8000, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @broadcast}}, [0x8, 0xe7, 0x1, 0x5, 0x5, 0x5, 0x20, 0x7, 0x8, 0x2, 0x1, 0x3, 0x59, 0x3]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}}, [0x5, 0xffffffff, 0x63ac0492, 0x8000, 0x6, 0x20, 0x6, 0x9, 0x101, 0x3, 0x100, 0x4, 0x1, 0x200, 0xffffffffffffffff]}, &(0x7f00000004c0)=0x100) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0xfffffffffffffffb, {{0x2, 0x4e23, @empty}}}, 0x88) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:42 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1686.048203][T21733] XFS (loop3): Invalid superblock magic number 16:23:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x116, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:43 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x37e, &(0x7f00000003c0), 0x10000000000000d3, 0x0, 0xc6df80fb3c38d3c4}, 0x2) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4681070559020000000000000003003f0004000000d603000038000000a8000000ff7f000020002000010005000300030000000000072300000900000002000000010000000500000001ffffff1f00000005000000ea70b51d88765fa5393875976b2e8e24333b7497b555188c374aafd2978babd75d1001fed52768e407ef5047f023c85a7703322ebbf01de45e15e6d806bced6eff1f8647be2c3e38e3664c6e2d6f1e155883dcdd4b8089aaa70d8c579bc2b7f7084bec75212f8f273d12337a88ed"], 0xc6) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 16:23:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:43 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:43 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) wait4(r2, &(0x7f0000000100), 0x20000009, &(0x7f0000000140)) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x8, &(0x7f0000000040)=@raw=[@ldst={0x3, 0x3, 0x1, 0x9, 0x7, 0x76, 0x4}, @call={0x85, 0x0, 0x0, 0x3f}, @alu={0x7, 0x1, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xb0a, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfae}, @jmp={0x5, 0x150e, 0x2, 0xf, 0xe, 0xffffffffffffffc0, 0xfffffffffffffff1}], &(0x7f0000000080)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xb, 0x8, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x35, 0x0, &(0x7f0000000200)="44cf541f2d2b00401c33d1d6b97cd5ef22c44a3243a1e3dfeb66f6dd8df9a3b485fb7fe3b02e1973f2e673a57aba4facf5740c593e", &(0x7f0000000240), 0x1f}, 0x28) r1 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffd9f, &(0x7f00000003c0)=[{&(0x7f0000000240)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xffffffffffffff41}, 0x2) 16:23:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:43 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1687.032801][T21794] XFS (loop3): Invalid superblock magic number 16:23:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x128, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f00000007c0)=0xe8) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file1\x00', 0x4, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="a511ff773becdaa78f69bd788a464858696187640762ae9b48148840cdd99e4a318d38a5978b3694300869b7ecddfe1196ac59a397dcc83a10a9a9765dd1e95faaa7ffe9871add01db2bb961fd1f5e3988d2ce7eee6812c26f5b5966a0b29116c7493a445b4835864d4e1e55dac48a382db90200dcae8d94abc557c2d0348f86da8a454b604f9db2f7369238582386ddd29e0318db9170d1be5e0d7755b3822e3d69ddc76f9198c6c224ede31cc54f02856215b112cb6eede60c", 0xba, 0x1}], 0x2, &(0x7f0000000800)={[{@sbsector={'sbsector', 0x3d, 0xfffffffffffffff9}}, {@hide='hide'}, {@check_strict='check=strict'}, {@uid={'uid', 0x3d, r3}}, {@map_off='map=off'}, {@map_normal='map=normal'}, {@uid={'uid', 0x3d, r4}}, {@map_off='map=off'}, {@sbsector={'sbsector', 0x3d, 0x1}}], [{@permit_directio='permit_directio'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x18}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@smackfshat={'smackfshat'}}, {@fowner_gt={'fowner>', r5}}, {@fowner_lt={'fowner<', r6}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'skcipher\x00'}}, {@uid_eq={'uid', 0x3d, r7}}, {@euid_lt={'euid<', r8}}]}) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) r9 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x104) write$FUSE_BMAP(r9, &(0x7f0000000100)={0x18, 0xfffffffffffffffe, 0x3, {0x7}}, 0x18) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:44 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000020000", 0x39}], 0x1}, 0x0) 16:23:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:44 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x4a8, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800002004704721556b3d5df5000a00"/57, 0x39}], 0x1}, 0x0) 16:23:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:44 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000040000", 0x39}], 0x1}, 0x0) 16:23:44 executing program 2: r0 = socket$kcm(0x10, 0x80000000000007, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2180c0, 0x19) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000100)) lseek(r2, 0x1f, 0x4) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:44 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000a0000", 0x39}], 0x1}, 0x0) [ 1687.987641][T21851] XFS (loop3): Invalid superblock magic number [ 1688.356746][T21889] XFS (loop3): Invalid superblock magic number 16:23:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x134, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:45 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x6, 0x94, 0x0, 0x3, 0x12, 0x5, 0x0, 0x1, 0x6, 0xa82, 0x9, 0x651}) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000100)) 16:23:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:45 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000000f0000", 0x39}], 0x1}, 0x0) 16:23:45 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x80, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000100)={0x78926755}, 0x4) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:45 executing program 2: r0 = socket$kcm(0x10, 0x6, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x4b3f, &(0x7f0000000080)=[{&(0x7f0000000040)="39000000140081ac2b67690ace8db6c801546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x5e}, 0x20000000000000) 16:23:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:45 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000600000", 0x39}], 0x1}, 0x0) 16:23:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f0000001280)=[{{&(0x7f00000003c0)=@ipx={0x4, 0x4c5e, 0x1, "cd19c8f1053e", 0x1}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000013c0)="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", 0x1000}, {&(0x7f0000000300)="755689fab3ed1370cd57b79fdce8e03c30db9e3412ec472c817fd5ee1e53cb47c777689e968d6a310cd29b37d5b44f98027c91cd99658270", 0x38}, {&(0x7f0000000440)="e716b720130912d3e67bd5df99713e69c36ac43c2e3e8e57a39e171d4a674e114216cf4608d7b19dc7dfee60bf7ba5ff5705457f9a53b445c1f6412e3280dfe287f60165eabcde", 0x47}, {&(0x7f00000004c0)="f133e60e62e06d40e0f1d7ba29afdcdfb05454842685a535b28056b4fcb58c98f0a61f8f9d9cf0b2692643b3b5835f4f7089b39e74a7ac762706552d672e098323173b48f7063877c6dd8c9e140d43edda39e473b68a07d09f1bc75cfe0589dba22bab6d0cf81d17036bdcdd357305e2131e519873adbeee96da61bb65142aeb6719b442c3a03047e3043ac6bb70f632a0b0236856ee72a259fe7c796051729ff512e1d4cb03ffd4dc64e40d750505c80b62e900", 0xb4}, {&(0x7f0000000580)="5dea4b9e3215f3bdb1bd3bd76a9dc6c89c8aa1db638e99d8fd641f79b96ebb4fb0190932a79ff35322a81c48f8cc6655500bfc39c42708cf6611713ffb0727bd3fe57ad35bc6a55ab683d0aa3d377a96f2f4418775bce62ea88583c8fad48f3f7787335e68ea81bdfe9e3af1da5a297faa8ddab8bafd8fb92e28b4be3e43709327dbdebf4cb4af387f6b2d350d229d49eda5b54c7e054c47926d619401bf3749552ac45a6ddf8bcf9fb8082578557e81b48486ea982d6351940d6183410706d516c8628879fd1ad1d317d84c2fd54d", 0xcf}, {&(0x7f0000000680)="8443e098b8aabcb82505acf91e6af8ca4649a5545a06c2f15874af", 0x1b}, {&(0x7f00000023c0)="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", 0x1000}], 0x7, &(0x7f0000000740)=[{0x108, 0x10f, 0x4, "d3d0e097e47dfbbe29c0847a53595d6e1aec9bb5c149f5ef3daabd2045470490f114eadfd763b59d3dcc6cf67174bc701b9a132fd459f6424b8d2109b34e9a3b05182d0f004b677b65f92767057404476c9b399fe0899f4620458270e65cb1d2cc7aebfeaad2d33496b613c11d7fe822080813a634a98d9e0df5260ab4c05b959c761d16fa964719fed42046827d06f9fb4e248d7c76e2f9cecec3259872111dcf404e7762b88f1983ec3d8a9ce7aa44cf286eb026e8e16d11e7270d0f6289f4d156a7fb1142c7368f3f442f7e7df99c35123913d8258a1e4b2d33a7390b91457d90a9b1e911dbbcf50b7b5bb382e1736ef44a8b"}, {0x98, 0x102, 0x8000, "eaa326b3d6e4419d59c20b75c9bfbbce1c5eee5ed09faeb5a39935cedecbf5b99364fd2c1adc670a80f26432252c6d099c7e68a95d643fcc1572cf347d4fcdeeb6b7ab1fefeeef4394ac34148bcb9130e47eca68ff099fa89a18fd7226de8a922743f97847daa15423c1fd191442b6dfc78242ed26005aa43dfcca0abd89efef182c0694"}, {0x88, 0x0, 0x7fff, "be721d547d7993f3990159c497e6b1cb4b5fafa089c580ce4ce58cd13351137c47663cf71ea61ff0fa8b73805429f2a8cb4bfa92fdd6a192a17bdbceb204a08d2cd2f0c668b93bb4274506a7adeb10726fb702f648a87b7fe049b963d6c3af5e5f7b38e6710da060fb82eeaf6d2a0629313cd7"}], 0x228}}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000980)="87fbe97c19cd7285a759cfe4eef0c665de821a7174acefd0827f2890f7612304fc549deddb73d263b567658722caf467b485c6368c79b1d74093ba1a21b5c91c2e834ab0457d10799645b540dacb0a53113861b57fa76f8503b45f624c7c055dd15b9c78c57f3cf9ad13dfaf3a90cf9091cd7e1d5f5b4647d1dc6d21c489b6f7e20a68c07b31455f0bb33f3668fda34b291ac33993fa49afc38b4a647ec4fb6efffa812c9d5bb513b8fbe8406a4f20156c2b0e4219adc54e13e028f5c979f3249042864271a8", 0xc6}, {&(0x7f0000000a80)="540e3931802f31ae7102d867c4fb22c8480ddd625083cd251a27ee2f68166b6b052784c41e5d78af187d896e35c17b2fbb875ed3c62f797e6e2c390a12b06e016545a4173d3a12d86f23f68b7c566757fe00cbf531b7fdf51dc749eff2a68c0694b83b691deb42502a884527e70517e14611167134a5b15cbf0122ea0f5a244534dd46ebb82b2344279872e7d602fa1dbcf88b251b6863161dae2a743a758be3f2133001fb32a9f7072a7a44bb38cf5eaa3ff98ca19a4f83f500a449cc65e3c53985ca860455cc69b13ee6104820fb17b6d32e24", 0xd4}, {&(0x7f0000000b80)="f85e2f4f05252a2e2e8ef3496d1d6d9586fd6ca70b27eedc57b2732f1a0ca443d669452285d08d8dd155cd4ef5231d31205b4c43cb6098", 0x37}, {&(0x7f0000000bc0)="e8b1e53a5fbcd3dd51ae88db836e3f1dc6877055ea8527eab10e9ffbb3751b0c8fed04936a4305814bce9dea7c27b827da2e7ec3c0bbedffc2552cb2ddfc6893631c45a9deb6eea722289618a828571d67ba07aa58fd049ccbb25962615d8efddc60b7e8fd35fcb4014bf586468150c8b71fb6d12f27a00b2d2b28134197fc3925339f907eb31e2ea4b13f595ba954eda1e77cec8147e6308e23d7640bf80a0c820a9125ff2ffd94f405ee161fee37c33162c381084fd5492c8d1dfba3a5768053a7804f20844fb462836420c2b640ccf6adf92eab52705914aef6", 0xdb}, {&(0x7f0000000cc0)="e28ef03fc6737b3ef12375322747219bf03661adc0ea9d35115487a47ecc175e693e7792d8ac1aff3b891cc87510", 0x2e}, {&(0x7f0000000d00)="361151ae888688d69617e5a9d18b46f98a81454b6bc4e97fa8164f6a550f6c71034cfa3c24a8d76e14c3657c62398f07e11ca3a772e751fd734134fe067db25076cd959d75db8c27f07f89ed923b717165fbca0a8b787e182c8afb1a70cecd63b681a17f1561ac4e793d6f80b601763dd8268ae5e64aae96cc45373dd98142fc41dd3d70d9a357224224302d95c1b3a854b9971834e97665ad7a7e157ef1128cc348ec287d67", 0xa6}, {&(0x7f0000000dc0)="d91cecf42e013549daa2966832650fd66b169d781fe8da54c63f5fab7365ace7274a59661ae07339581cc96292c16f1f8389e96b008e21f6bef13af91c72451b9ebaee60177f453030ee4f5b39202b11f9d170e3afdd97ee08fd962e7884b17a702c10950cd75a7a6436a9efc07ee706e51d0ad4ffb9d5ecd4ef62b8014be6ec5022765831", 0x85}, {&(0x7f0000000e80)="336706e0687e40b336493509ef0ae5d52f12c6c5a308ad49b70d9497fa748d3928b2cffc31ae6a799f076470007a8e38ec6b20f5109f68ca3a29f7cee6e9daf3a38634e958662d9a48db5afcdeba9d1706a54da6a137ad592172e91bd6e9d6605e23e74f8f91fe456abb49d6be18d10f0fc1427132ed13305fd3e177db800f6924ffd425b364045ad1cea233767fc9ec699173c690d2713c029429de0f1b22008765cfde5f9193519966a4b5106ecd1520d5084ba978f2fe425beef5640b9aa40150163a281a063a218dd10d4e4e437792f36f57aa0f6a589f16cc1389255deb95884db7", 0xe4}], 0x8, &(0x7f0000001000)=[{0x38, 0x103, 0xfffffffffffffff8, "5e65544131d8fbb4db92b503e247c52b9b63ddf7f26f5c1f776998f4229d8092f351a41679d3c857"}], 0x38}}, {{&(0x7f0000001040)=@rc={0x1f, {0x7f, 0xffff, 0x7f, 0x742c, 0x7, 0x5}, 0x50a20b03}, 0x80, &(0x7f0000001240)=[{&(0x7f00000010c0)="063b57ed27eddfabddc0c67af1ffc43e948ce59bbabaad1735f89eabef8d1f7866cd2760a3f5fb98c2dbb7817ece584d8448307eccd91a4dbaf04a199d2c7a44af453f36900aa31435d201de42ca5185a4a9b357f0774e78be74279eb773406eaa200c5dff3df83f723582d4b882c7fc6568b8c387ac3909f2c20f256c7c", 0x7e}, {&(0x7f0000001140)="07f0cee29029cd7e8a829fe0560d82ff0e83981e19295ca2bdb9e6d66e3c8eecfc647a242bf434c01c5faf5f5f583a67b3bf86fc6df1c1f716b0505c859e47924324d806b766957f4f3d0e0d160dd780183952cd6ee14f8bc4428acc99c799c42bff47515aff363665775a02f622c12a2b941b0fd533c6fcd56c0d2a9f691cd9a98ce5d9ffe0f1d830c57c99a190fdb06c593c208ef4c0135b017ab13b35ce2e9f71bbcbcc8172bb3ea5e862fd21b673da5b608956c5f7c9704530208633c84dffd6686a37f90f5d5a591554c723482a991f32d9163f8c6c9c009c261d254e", 0xdf}], 0x2, &(0x7f0000004740)=[{0x70, 0x117, 0x2, "4594f76cbc222447cf0334c73f73cb9dbb7e39c8d348efab3be0d54085405ed0b55f175af2e2644f81e38edd70aef941f87fd87001af8defed752ef6e86b971a9e081e64028afad39452b0b148c6030d4ad681d5a7d1763c6b7008"}, {0x1010, 0x11d, 0x401, "bd9a56782f9be71b26cf5bb1e4c0de39f99a2e9a29e265db22ea89ebdddaa7b7e9fe9d8b58d643f50d78cfe5436d3a88072dad68c206311e1fbbf151117562bee9cb9f219b100b28f2d20adacf14e098d68c2ec9d26750833587e7ce24d38b62379bd06ffa8e1b76f11485faea60921b7cd1b5c88f695f227f4604e6e6a30fdeeeeda3d82ff94629838286471fb9c11c4d3317f29ceb5bb9da49fa01860badfbeeb8a2120edfa2c3296cf59a61b8bae6238685b29697c050e5ebfc05a2ee95a99b86fa736cff840d15f595a86595f69a2183c1d0a8c2349debabd7c8e750274c641414e66929d9423baa661da2fbc96d081727683310c36876039a0882e0db69ff7a96742bec91529c9c6cc05903244c2c403936cf3d1de729aa6779cb0d1d81f7b3810408667151d78765ad16d20f68d449aefdeab011aaa9cdfecc53352f329eb87e0aed614ec3614494f809780ae20e26daad37a9e88b412c24d749b1636b5c1816fa629a0015ae35cf3928240ac2c7aef5d3651d5046a1863094cf1e278ef0e9dfdf67f88638cc0b2cdee5c694e80eb36a3c7abff7f796ddbea6d51479d5784faec82dd1b98a584c05c5ce077e693993a1040f3095159e84cc7ef026af845769b7a639c95f0e50bc54673d9cfdf303f49b4f3b8f47afa735276fbea4226336221fe8eecd1197fb3276355ead4541438795d40fc6841fd632162240c64298713cdf66dcffad7ee7afcb6e51718b1649d4ba1bb489bc46b2b3f75ea2be52a62fba1daae5c87e1667021a682959fd0af626a96a70a0800f59f5ec673711a5a4ba84fbf6c4eebe5b812aa2a59dca729aa3a66711c160f5fa613f0d6e4ed719c87c649f09481fc40f5a9cdd099827ea5c068bb240ddc87523ff3721ac14d0dbf4c1643a4eaaa8135dbe716c73020aa72ebc9e51a2e69916a5f4be5d3e5348857db4aed4064d85e8eacaa0b78ebbb6ac4f61a618802f7e54ef11401a29995a69b5040a039c932ba6872a247eb7df83422c550c31470f99ecdf5555a33a0a4d7aebe1a6cdcb4881b9cb312d7c472880c170964d14bbd44a87ebe0f634fd410ca834fae599a4b3b18aae8bcccd78dafbad651ff6ef75fe9c4f936ae3b56d5ce71a279d4348261a3997d13b485b5cf498587429f18bc66d196569c23ecb02b851a5621f0b0c12934ae2bcbac0138e63017eaebbe2ed2e068757345e1c32248678337115391b93fd53b39297cdff667173234508b69b6e476607eeb9c216a817b5a8e2108790bba74f194caa65e5377f2438b03d6f6225ffbb53bc2bbd3dbfa8313d45e73aa83e03345c78ea88b666b65e2a93a48e5b0caf36102916ef78003f1e21096878a17b1a30930325e07a434ea41d3064fadd69bae371480d5ab84ed60612321534ec983f95d1b8eb813389009f35899e4be3488a407950a8f0d4525ba25639bf4416428d8ed4e038e5bc0304bf75e1c89beaa9d549c72832574abd9f8a7f05ced69d283e5eaaa050be4bf30959da1e1c399283b662e83e0663b71a0117fb8f9748da79947eb0609b397429affe92e9e9b5df1bd91769b9eed1e25455a599efeb9b48c92db4053ee32a8a8495118f7c46d055d01db99a65458e2ca124c419530026608036c57c6ef0d42a3f0115c09f08b9f1005b275f734296cd1d4825c8f33539652613bd16d5e6cd62db8a1bcce0ec4f4c6a9ef92ebeb7f7f6053dd026a6f84398a42c74456bc6f4f810282a7a27941bb97e438f53933b468d8f142a98de959f488711cd4130b979cebb587d35cfd166d6d231563bc67748c087d1851de938735231cd732a43f1607e8f0808f2b7e0d7c546c0e27ee621530f555e6d7579eccb387dd57cd0f14cb10f2941e1b7d411001eadc12a3d00f5f3f856408445bcc5ea04db05702e1a6c83aae09bc38792ddac04aec41b6a9157d036b53558328ccf835a93cd63c6f485bb49bc4f030bb9e6db1046667d4870219997e66baf392dc08ef77009b58bd6aea1eb213a7d3942448cecce9a9b2e3eadbbd7e391a777dfaa14cc844a3ee419335625301ec7d384d522676cae6af175f119f2e953bd8ce11a08e24abd528bc58cb65e677961162f5c93b1df0a3363ff2ddc9c10c5d10c8baf25d660ce5ddcfef8207e0db34cdad64df8c4484265896cedf63976ec95c31c0a79a5da078ece264e2daf76e5fb19c27793800267de9d41326960bdad2a115a2f8152df7653e5a3c79c965df97b9ed974c934f26047c4de4c05ffe52f5314cc09fe985d4393e32881287df9f5750de408a8328f1c7ec1d60a40d50682f1fc46d7f4ee923c98fca27713d43a74aa39fa28ba2d2fdd958cf94cd079e847cf08da9083034ea4111d992e6d8ca14046ce55665312add3f1f3923965bcec38360dd18b1e06804c4bfcca7721e587e1239161958a30a59cb3f8d2ea16aa7ad6b8b6be1f1eec9521b4a9d5a07b9d87fae33ad2b170d8000457b7d154b858822c92b41755bd14e8a487a153d4581c9e2586701444a02632882dd11e94c53dc6327c400f0fb31ed805593b703950d1c392b976b06b56e343d4354d851d4433ed470ca211061038ac76ad4a63352b7988e72851a675e900956fc9e621e9552baa8892593478bd5146bfa1777e571ac057626422e533e0d0cab37f595a7141b04e7e135e45575ad9ff0246c2b23789d0de0e74a9dc1e9d3aaf74ba7f1ef5876832a8e92425c6603702acae87d8aa5cfabbc9fea31adaae30c579e211128d26c3cd258502933f6b2f171e010b5f15e44658b0bfc9ea7d90cdca9cb6dc539badd61bdf14b061e4ef1efd0862a87e8e34d3f97de2719c992f6552136a24ca6f376209373410fb60a8e0e1b58f2d65733fda920066d5f9a3428baf83d3c54e0fab3cad469d651b29102570706c460574baf55c8d050016317620cd42f7cf2c8a2b3925801e9b90b84ea1a19660fbd93b7bacac4e5d3bfea5b7ef42dfd9ac7840d13b3f59f4b301cb4c49cef34bc7de416862def76268a72c3d0594ab490e65759091aded26812c5ed8bbd85982a5a88821b8964a97d5d6d9d75c41de9f88f41c97467e081fcfd95e717cb0025a5e46ba8ce562ae46c398effa53984a718cd3deaa41290eddcbad18730b73595c0b933b0a1fb94233690a3b71fa4b96dfd816a0ebeac94aac06a1de6c220a63995854666fe84bc6190fd91b121ffb93945cf54e081c1ac886bc011f9d7e0a6331035238fcd8a24f0589774f7356b3d3a82267cb2f2c12c90d376118a9c3d7fa809d3d70f5331dd1d7fefaa659b6c224693f311b1f34cc1444c420341e0c4181eccd6fa828b33409bbf14d01904ea5f84d31509294fed83f037491bcb9a094ca812d80d05c7061c5ca08f8a2f17fd1fbc46a5ca47f2e945a3871775a4b150beee6ba47b64754236763d6ed83421c8f0ea607c2ecbb0effa2eca9dce71183d3ee2802bd2096202ea65ac645c25e07eb7ae97b489be5366df5077b3c554140123ac1efe3ed9f02a48e31c3fe8ee93ebff3b3b67cd5ec599ecca178c1651571fd9258920f9f70c9f93ef389243e191b96c4e2b74edbcfa19035eb3fd53a5314cba91a6d065148c3e6196ca097af5063f7ec75439079fbc9fe275298c9e27e8a75b5df08374c1287dcd292f7b4f1e574608ed7d338eb471112328239e2eac457bf25cde7cd65ef19b2ae85e05e4f9a701faca5b63ca70a31eb681ab651f6e172033526b3a48f6c26fe3e14fc17d4486823678fd03d2b0c0ab6fe2be63109c762f03e42c9de169adbbc9a5b4ea3ee7a185802bd134473ef6cd54102f48e3c25e3b2ef0980433e99685d5ddeeb4e93d65463ad9aa0438f5bd67a235a5b91920c2dfa3742c8bdb0fec42ecf5dafa7795bd5ec5c482765747e4cefca105e21d749c19742985b3f9e8d82a336a2785298c156509c1b4daea6e6efd1190dcce895baca1ef1232972dac0324fd7f8832fcf8dec5e3c35ee4cb19372d2c4e41ab80bbbc4bd54f7087f9b99b40b31915cd43bddca21548df5a92237dbd189d833d62113efd7f9e62b3aa7d392d72c415b54f409c0ea5481c235d68209e2386b8700fccea4d450aff7ef3880ac81f0f29205c54d9545ac578e7fd4bc7fef0b767514c1972063a405cd40335f2adc8efc268c8bbf8a87597d73e5fe4b66f0015f7b83c1fbbc9944cf2dbc6c27247690324ff51f8acadc00205a12d83c72a760d170a808336b1ee4db1b719fffbd9b442b53fd8311de28bea19e6d3ddf921f6641d509f28e66c3d31690ddacc9a2b353a0fde264f3d8cf3e4a5b48faac8d258fdf7e5f641c9544789fd86d45c715952bdf528f469ca644086d6bc558112d27575235d970109f26202c19dbebb337010487e2a8a1497bb7700a74dd6bf43781adaa52c2e9acda5d7ae79c951aec3019c513fd71ef3caab4bab135070a4964c7c26c1695a809d46905c188147e9a69234fd802375160c69049944071ea017ed4d389bb748450c24a25b58fda915c995182032a67f935f8ae3a783eb88744715d5ec8df1051e27eaf54404bd9d417fd1575e2becb1e321a683ffb0cd5c69e128d90468446d7918e0003b4c5e97ffe3bb1bb5ce944f07157d3aeb518477eaab6bbc72b5d5cc5e6011c6a8880b507189c2d7ab5e4c4840be76881e75b04cc189ee4b6482f390748a6c7d9be8d99e16309ea037b2e1236b88042df19e267c91b4138f08771e49b7497de86d02a1bc31c3ffd8506faae3445fcfc6f47918e5a37a3021162a9baf163e1bd4fcc4a126aed976d2325fceb8440fc7678c796437b09bd492692fb932cb95b9cd7e3240fc73c993bc0469be6229468119ff30e39a7f06c2d0769910ef2151d1a885214dc0a9e0daf65305ef6514f7117d81a5fb2126c2e2229b5da4b7be90df29565b2e68c1a1b9e9fb91cd41a11cdd2301775215bdef93680fde2ba99c2066b1837ea4455731f037f224c4a936dd73b5892349aa6feee47273170abdc10d4fbd87bf54ca6a98645b8edb7e91b4f6e5a99de6d7e006e089d8cf539a6bf41a42b38afa3c82bf18f2e16063e4ec4d124a7e833d065d6530a69bc74233646a1d7641dfa8b826786b785644385f5f67a9c557f253d67fa553ba63e5a10ec3d9b09d012ff243d57fdebf6a20f440eadca321f08aa1444bff813274da2856008198575165135db0a919fe9287921422fd2fe630943a87c20f564f08ef5200bf6c2bb893eb9cff9eddef270b5ea1232586ecd8e25fc2f80d04120bb59b7f248a32cacebfe74af799e4286f3362726c988259dc8a4ca6cbd2ff0e2de0ab54fc5deef7bd294b92bf4bbc401480f8334341b5f52500058a8d446d347f38d3a97d09a55b8fcf0e76dc5f63f4f704b51996ae1d5bf0e7417347d901807e40d97fe09cb9affc39ae5b74195fe837e7f4ac157d8daa9e426448469663e7e1f759b4c16e053d2285bae1d4f641104c6c6a6b813a79e75851a3641092c1d417eb0c29f4adbf79607de00db45809783b65c231f95f824038bb76d04f156f5e1a23fd1494b5654920cdd9644f6a8c9e216a27bb5bb19885b648ff9b8fef64bc990719a5ebdb6c6b18533335e6c9960f2e9f788a45551f3be2ad1d0472a3190e003d35fa40495392c1c5a6f0f9a6d68af43e156a37688a0a225b394b72b835c8cac8532ba5383e3c174acc8d934f9c92ba225a59c715a46011ac5a2f2d2e428f208b2a0912749387adaa21535b2735383ac23eb30e91f0b6c901750997f3224627926259d1453efc7547426fdc097acb6a69e2a6b191a986c30da100713208f35037b62055a"}, {0xf0, 0xff, 0x2, "8641fd42c1e5e084b78e2aba8f48c44e53592cf7375195247c9a4d010f82e7b3b362fa6c68abbb9a495130e64b7edcb389340fac96c9ded69d4f3c3a5a362fe3e524f8a87d200d1d7bfb7a40aefc1a4ab2339f8bc5b1fb5df0ed795f1a7b1f84aed12ed3f68f5437531c30aa719b59c1d50731440875e1f05ac3d12af50e9f271d878313186d52cec85934c76fb4ce92818ffde666b7ab8f0e15b976e870c1bc2246b526a774ea268247cab75545fa2a5db9ba9845b1923415d03fd3949ce0b1d699a8f3c4d3e99517c79fd7d29505f4930fdd641533d315ccf76b05"}, {0x60, 0x102, 0x8, "ef2639f0b76b1ee1e32db1798bc05cedef4a08956a01e90604c3d821d74486b09620ba6c30461bc3e5cfad2479ce38da927f353cb47f1228553e039dc3a47d90a1336ae38a0e65368d12ffba97"}], 0x11d0}}], 0x3, 0x24000010) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x18, 0xcc, 0x9, 0x1, 0xc199a936add293c7, r2, 0x8, [], r4, r0, 0x4}, 0x3c) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0xffffffffffffffcc, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}, 0xfffffffffffffffe}], 0x1, 0x0, 0x0) [ 1688.916978][T21917] XFS (loop3): Invalid superblock magic number 16:23:45 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000a00", 0x39}], 0x1}, 0x0) 16:23:45 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x80000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000080)) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffffe, 0x10080) [ 1689.290886][T21953] XFS (loop3): Invalid superblock magic number 16:23:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x148, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$ceph(&(0x7f00000002c0)='ceph\x00', &(0x7f0000000300)='./file0\x00', 0xf, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="23c234210ee66c036da4d7f033078cbc73b8f1abffbcf34d944d659dcb5aa0730afb656434f816ddf6dd1cb066f85e499009b030a4dcd9e9ebca2a89e518d7e0593447d25b5076592331d09db968c3b18ba2cdcccfaca787636617e9c91ba4f5223237ff3462f725bf", 0x69, 0x1ff}], 0x1000000, &(0x7f0000000480)='!\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x98, &(0x7f0000002400)=ANY=[@ANYBLOB="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"], 0x1018}, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='gre0\x00') write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000000180)={{0x6, 0x7, 0x0, 0x2, 'syz0\x00', 0x9}, 0x4, 0x1, 0x51dc38d8, r4, 0x5, 0xb9, 'syz0\x00', &(0x7f0000000140)=['ecb(blowfish)\x00', 'gre0\x00', 'ppp1\x00', '\x00', 'gre0\x00'], 0x1e, [], [0x7, 0x2, 0x4, 0x81]}) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:46 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x8a, "1c413aed5b7fd6b2674a6f0d60e8116094887bed97863e5a2e66a68a1eca60c3981a3783e0065b1527b5e423319b230f87e68c8dfa5bad32958da314518aab9bc6eabc82b26b13f70bea04a78746ea1dd2709181aab8a6036258a68f2aa7b724949f79a24962c42fa64cbbc8e29038f27113d9770832d1d5c9c51da97e3a343d337b9fab213566954989"}, &(0x7f0000000040)=0x92) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r2, 0xab}, &(0x7f00000001c0)=0xc) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000200)={0x8, {{0x2, 0x4e22, @multicast2}}}, 0x88) 16:23:46 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000f00", 0x39}], 0x1}, 0x0) 16:23:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:46 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000701800", 0x39}], 0x1}, 0x0) [ 1689.702260][T21969] ceph: device name is missing path (no : separator in /dev/loop5) 16:23:46 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x8000, 0x244000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x10002, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0xffffffffffff99f5}}, {@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}, {@cache_fscache='cache=fscache'}], [{@subj_user={'subj_user', 0x3d, '\\eth0'}}]}}) [ 1689.825289][T21975] ceph: device name is missing path (no : separator in /dev/loop5) 16:23:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:46 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000731a00", 0x39}], 0x1}, 0x0) [ 1689.913455][T21980] XFS (loop3): Invalid superblock magic number [ 1690.312372][T22016] XFS (loop3): Invalid superblock magic number 16:23:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x14c, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:47 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0xaf72, 0x202) bind$ax25(r0, &(0x7f00000001c0)={{0x3, @null, 0x1}, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null]}, 0x48) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/raw6\x00') ioctl$KVM_SMI(r3, 0xaeb7) accept$alg(r2, 0x0, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r4 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$VIDIOC_G_STD(r5, 0x80085617, &(0x7f0000000100)) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:47 executing program 2: r0 = socket$kcm(0x10, 0x2000004000002, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="3c455b0e56decf88a9d42a11658cd4aa0258851ad9c3d0e3e7663e51b99fc7d6514505da864cd2fb4a39c67560dc9df93ed2f64bae767412e6801bbb25a293ccc91575f90c3b67f8ed"}, {&(0x7f00000002c0)="460813490cdb99b54f01601ba299dd622a1c58cbb4680b448dc5b96f8bbeb57c67f9e0d1cf75dc6fee804f8768044287e2f980faff59c6d45dae299539945e2a7c73d4d0e97eefb85015ba672612f8904b9a6845047a152a6a2c8f8451cc41cfb7d7d4729c6b9d82b58f04db1aff2bdfd56c4a0b72bc780d2cc200a4d4d4bcf8d098f1083146fef9245c"}, {&(0x7f0000000380)}, {&(0x7f0000000400)="318984005e2a096a2b4a96ed9af5bc33915105d1a0315514a40dbdb9b89ffbf6ef6775843c0d48"}], 0x0, 0x0, 0xfffffffffffffc89}, 0xfffffffffffffffd) 16:23:47 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000003a1b00", 0x39}], 0x1}, 0x0) 16:23:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:47 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)}, 0x83) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6000, 0x3) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xcc, r2, 0x700, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x8}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x30}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x65}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000140)={0x0, 0x100, 0x51, &(0x7f0000000100)}) openat(r1, &(0x7f0000000080)='./file0\x00', 0x100, 0x4) 16:23:47 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000001b3a00", 0x39}], 0x1}, 0x0) 16:23:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0xfdcc) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0xffffff29, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x132}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x54000, 0x100) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000100)={0x2, 0x7, 0x2, 0x2}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x3ff, 0x400000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x1c, r3, 0x8, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) ioctl(r2, 0xfffffffffffffff9, &(0x7f0000000440)="8970f72c12eac4267197") r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000600)=ANY=[], 0xfec8) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x400000, 0x0) recvmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f00000004c0)={0x2, 0xffffffffffffffff, 0x2000, 0x7, 0x0, 0x1f, 0x1, 0x1997, 0xff, 0x4}, 0x10) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x220, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x20000004) [ 1690.948530][T22046] XFS (loop3): Invalid superblock magic number 16:23:47 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000003f00", 0x39}], 0x1}, 0x0) 16:23:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x14d, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:48 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:48 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000004000", 0x39}], 0x1}, 0x0) 16:23:48 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000006000", 0x39}], 0x1}, 0x0) 16:23:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:48 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x2f4, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff335b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x81, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xb0}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x7}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}]}, @TIPC_NLA_LINK={0xe4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x73bfa40e}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff00000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x999}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4a3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x719}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x897e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x942}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x2f4}, 0x1, 0x0, 0x0, 0x40000}, 0x2000c044) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}]}, 0x0) 16:23:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:48 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000187000", 0x39}], 0x1}, 0x0) [ 1691.856089][T22106] XFS (loop3): Invalid superblock magic number [ 1692.226022][T22138] XFS (loop3): Invalid superblock magic number 16:23:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x14e, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:49 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x8000000000002, 0x300) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) poll(&(0x7f0000000080)=[{r2}], 0x1, 0xb7) dup3(r1, r2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:49 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000001a7300", 0x39}], 0x1}, 0x0) 16:23:49 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000004003", 0x39}], 0x1}, 0x0) 16:23:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:49 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000340", 0x39}], 0x1}, 0x0) 16:23:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1692.785558][T22165] XFS (loop3): Invalid superblock magic number 16:23:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x14f, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:50 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:50 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x34}], 0x1}, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x20) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000180)={0x200, 0x1, 0x7, {0xa, @pix={0x3, 0x9, 0x31364d59, 0x7, 0xffffffffffffb114, 0x0, 0x6, 0x3, 0x0, 0x7, 0x3, 0x3}}}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000080)=0x81) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000280)={0x1, r2}) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) 16:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:50 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:50 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) unlink(&(0x7f0000000040)='./file0\x00') utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}, 0x0) [ 1693.576986][T22215] XFS (loop3): Invalid superblock magic number 16:23:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1693.952306][T22248] XFS (loop3): Invalid superblock magic number 16:23:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x150, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:51 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:51 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) r2 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x400, 0x3) linkat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x1000) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000400)="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", 0x213}], 0x1}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x58) 16:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:51 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:51 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x3}, 0x2) r1 = socket$kcm(0x10, 0x400005, 0x4) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000080)) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1694.496902][T22273] XFS (loop3): Invalid superblock magic number 16:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1694.907681][T22305] XFS (loop3): Invalid superblock magic number 16:23:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x180, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:52 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:52 executing program 2: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000080)={0xff, 0x7}) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:52 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000001b", 0x39}], 0x1}, 0x0) 16:23:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000240)={0x1, 0x4, 0x14, 0x5, 0x8, 0x90}) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="8f6429cc71110da88bdbcc9053c70dea8642a903d699a1306287f73a0e8f230d3decdde69490081ad940fa2f043859467f504e3dd7cb66aaeac218661663b922e721b1c7833f510b8da588e4514945bbd3dca4aac2f529190bf1540f0182c853bc646806138753cb074805876767c63e2e3f31fa7f09cb9d9f7a4c738f8c1130efb509cbeca2e83d835f4f3cba65ef26a175c230a7d244037386d82d33ee99ca2158a66595642942e3cc942629bf504b856c893fc31a8b43895dc14318c9c6cb6aab424256e10f89ab7713188d9235792067b0121f28e31595620b8ef9f4350df172bd8a0e9168fe06ece8f531fe4485", 0xf0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) 16:23:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1695.545132][T22337] XFS (loop3): Invalid superblock magic number [ 1695.953332][T22361] XFS (loop3): Invalid superblock magic number 16:23:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x184, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:53 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000000e40)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/236, 0xec}, {&(0x7f0000000200)=""/27, 0x1b}, {&(0x7f0000000240)=""/240, 0xf0}, {&(0x7f0000000340)=""/127, 0x7f}, {&(0x7f0000000400)=""/196, 0xc4}], 0x5, &(0x7f0000000580)=""/212, 0xd4}, 0x80000000}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000680)=""/1, 0x1}, {&(0x7f00000006c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/167, 0xa7}, {&(0x7f0000000800)=""/210, 0xd2}, {&(0x7f0000000900)=""/42, 0x2a}, {&(0x7f0000000940)=""/208, 0xd0}, {&(0x7f0000000a40)=""/134, 0x86}, {&(0x7f0000000b00)=""/25, 0x19}, {&(0x7f0000000b40)=""/220, 0xdc}, {&(0x7f0000000c40)=""/146, 0x92}], 0xa, &(0x7f0000000dc0)=""/109, 0x6d}, 0x401}], 0x2, 0x20, &(0x7f0000000ec0)={0x0, 0x989680}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f40)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x90000000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:53 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:53 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200200, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x0, 0x3}, 0x2) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1, 0x0, 0xf5}, 0x0) 16:23:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1696.532769][T22385] XFS (loop3): Invalid superblock magic number 16:23:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x18c, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:54 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:54 executing program 2: r0 = socket$inet(0x2, 0x80004, 0x4) accept(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x80) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:54 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000018", 0x39}], 0x1}, 0x0) 16:23:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:54 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0x1fd) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000240)={@remote, r2}, 0x14) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000002c0)={0x6, 0x0, 0x2, 0x1}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000300)={r3, 0x8}) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000080)=ANY=[@ANYBLOB="05e6ffff90ee2d624fdeb92e750b00b0a01dfffffffff300"]) write$P9_RRENAME(r1, &(0x7f0000000280)={0x7, 0x15, 0x2}, 0x7) 16:23:54 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000001a", 0x39}], 0x1}, 0x0) 16:23:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1697.506777][T22449] XFS (loop3): Invalid superblock magic number [ 1697.687104][T22473] QAT: Invalid ioctl [ 1697.698243][T22473] QAT: Invalid ioctl [ 1697.712372][T22473] QAT: Invalid ioctl [ 1697.728315][T22473] QAT: Invalid ioctl [ 1697.734954][T22476] QAT: Invalid ioctl [ 1697.920155][T22481] XFS (loop3): Invalid superblock magic number 16:23:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x18e, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:55 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000ffffff", 0x39}], 0x1}, 0x0) 16:23:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:55 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{&(0x7f0000000040)=@sco, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)=""/101, 0x65}, {&(0x7f0000000180)=""/209, 0xd1}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000300)=""/85, 0x55}, {&(0x7f0000000400)=""/210, 0xd2}, {&(0x7f0000000500)=""/208, 0xd0}, {&(0x7f0000000380)=""/6, 0x6}], 0x7}, 0xff1}, {{&(0x7f0000000680)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/192, 0xc0}], 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001800)=""/135, 0x87}, {&(0x7f00000018c0)=""/52, 0x34}, {&(0x7f0000001900)=""/51, 0x33}, {&(0x7f0000001940)=""/218, 0xda}, {&(0x7f0000001a40)=""/163, 0xa3}, {&(0x7f0000001b00)=""/25, 0x19}, {&(0x7f0000001b40)=""/208, 0xd0}], 0x7, &(0x7f0000001cc0)=""/15, 0xf}, 0x8d}, {{&(0x7f0000001d00)=@ax25={{0x3, @netrom}, [@null, @remote, @netrom, @netrom, @remote, @default, @netrom, @default]}, 0x80, &(0x7f0000003140)=[{&(0x7f0000001d80)=""/96, 0x60}, {&(0x7f0000001e00)=""/68, 0x44}, {&(0x7f0000001e80)=""/33, 0x21}, {&(0x7f0000001ec0)=""/194, 0xc2}, {&(0x7f0000001fc0)=""/240, 0xf0}, {&(0x7f00000020c0)=""/20, 0x14}, {&(0x7f0000002100)=""/4, 0x4}, {&(0x7f0000002140)=""/4096, 0x1000}], 0x8}, 0x200}], 0x4, 0x0, &(0x7f00000032c0)={0x77359400}) 16:23:55 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000ffffff", 0x39}], 0x1}, 0x0) 16:23:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:55 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e21, @loopback}}, [0x3ff, 0x3, 0x8, 0x6, 0x40, 0xfffffffffffffe01, 0x7f, 0x31b, 0x6, 0x40, 0x4, 0x4, 0x81, 0x8, 0x401]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000640)={r4, 0xcc, &(0x7f0000000540)=[@in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @remote}}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e24, 0x7, @local, 0xffffffff}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x4}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e24, 0x1000, @remote, 0x8}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0x3a60000000000000, @mcast1}]}, &(0x7f0000000680)=0x10) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x20000, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x33, 0x7e, 0x75, 0x64, 0x0, 0x36, 0x77], 0x2d, [0x35, 0x30, 0x36, 0x75], 0x2d, [0x32, 0x31, 0x7f, 0x7d], 0x2d, [0x37, 0x0, 0x3c, 0x61], 0x2d, [0x34, 0x37, 0x61, 0x31, 0x77, 0x63, 0x33, 0x75]}}}]}}) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:55 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000ffffff", 0x39}], 0x1}, 0x0) 16:23:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1698.600357][T22509] XFS (loop3): Invalid superblock magic number 16:23:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x19e, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:56 executing program 2: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) 16:23:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:56 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000007fffff", 0x39}], 0x1}, 0x0) 16:23:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:56 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a000000009effff", 0x39}], 0x1}, 0x0) 16:23:56 executing program 2: r0 = socket$kcm(0x10, 0x80800000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20000, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x9, 0x6, 0x5, 0x5, 'syz0\x00', 0x52}, 0x0, 0x2, 0x380, r2, 0x1, 0xdc, 'syz1\x00', &(0x7f0000000100)=['\x00'], 0x1, [], [0x4, 0x81, 0x8, 0x6]}) 16:23:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xd3, &(0x7f0000000140)="115e0bcfe47bf070398cac7e6c5596ec39000000") bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:56 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000efffff", 0x39}], 0x1}, 0x0) 16:23:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) [ 1699.561940][T22562] XFS (loop3): Invalid superblock magic number [ 1700.023236][T22594] XFS (loop3): Invalid superblock magic number 16:23:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x1b8, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:57 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000100)=0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:57 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000f0ffff", 0x39}], 0x1}, 0x0) 16:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:57 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:57 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x6, @mcast2, 0xb7}, r1}}, 0x30) r2 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1700.606788][T22616] XFS (loop3): Invalid superblock magic number [ 1700.982259][T22647] XFS (loop3): Invalid superblock magic number 16:23:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x1c0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:58 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:58 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x40, 0x0) sync_file_range(r0, 0x93b3, 0x1, 0x4) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000240)={@multicast1, @broadcast}, &(0x7f0000000280)=0x8) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000080)={0x8}, &(0x7f0000000100), &(0x7f00000001c0)={r2, r3+10000000}, 0x8) 16:23:58 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:58 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1701.548120][T22668] XFS (loop3): Invalid superblock magic number 16:23:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1701.928561][T22697] XFS (loop3): Invalid superblock magic number 16:23:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x1d0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:23:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:59 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:59 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getpeername$unix(r0, &(0x7f0000000040), &(0x7f0000000100)=0x6e) 16:23:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:23:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:23:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:23:59 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:23:59 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000100)={r2, 0x3}) 16:23:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1702.542587][T22727] XFS (loop3): Invalid superblock magic number [ 1702.912052][T22754] XFS (loop3): Invalid superblock magic number 16:24:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x1d4, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:00 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:24:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:00 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x4c0000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x7, 0x8) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000100)=0x1, 0x4) 16:24:00 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:00 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960358c52e6b4a421556b3d5df5000a00000000000000", 0xc80b7e0a1311603c}], 0x1}, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x7, @empty, 0x3}}, 0x0, 0xbe9e, 0x0, "b1e7e4b66cbfafb10403c9b3e964c7981edd2443264646e33c38d48f396fb10e29217083190d19b649c452da4d558055f9913bdb7f7d7e04abc49f67b66ef082270faeee1136de35db70e539ae4e671b"}, 0xd8) 16:24:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:24:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1703.473400][T22776] XFS (loop3): Invalid superblock magic number [ 1703.811706][T22806] XFS (loop3): Invalid superblock magic number 16:24:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x1e0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:00 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:24:00 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffd6b, &(0x7f00000003c0), 0x1}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x10000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000200)=""/247) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000000)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f0000000500)={&(0x7f0000000040)=ANY=[@ANYBLOB="9affffff", @ANYRES16=r2, @ANYBLOB="00012cbd7000fcdbdf0104000000d44d358376e6709a6cc027f3d1325b8f66b21860e22b98681cd1ef8d12beee3f2d307c2f35eaaa37ae1f2bb7d03f09e021667ae77ec29a8994949b94cf4fd14b59a51abcd03b7574fea3ac376609421e566ca491ed79c6017540014a1bcacd1b7d9bfcdd9f98ca8a616d4e"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) 16:24:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:01 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:24:01 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x4, 0x80, 0x1ff, 0x6, 0x2, 0x6, 0x5, 0x246, 0x38, 0x94, 0x40, 0x4, 0x20, 0x1, 0x0, 0x747, 0x8d70}, [{0x70000003, 0x7fff, 0x8, 0x3, 0x8, 0x8, 0x5, 0x7f}], "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", [[], [], [], [], [], [], []]}, 0x1758) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000080)=0x8) 16:24:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1704.314060][T22841] XFS (loop3): Invalid superblock magic number 16:24:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x201, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:01 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x80000000, 0xe7}) 16:24:01 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:24:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:01 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x8, 0x0, 0x0) 16:24:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:01 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1705.123868][T22892] XFS (loop3): Invalid superblock magic number [ 1705.470141][T22918] XFS (loop3): Invalid superblock magic number 16:24:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x212, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:02 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 16:24:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 16:24:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:02 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000040)) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 16:24:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 16:24:02 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1706.018207][T22941] XFS (loop3): Invalid superblock magic number [ 1706.319766][T22973] XFS (loop3): Invalid superblock magic number 16:24:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x214, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:03 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x8000, 0x0) accept4$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, &(0x7f00000001c0)=0x1c, 0xd4762d575e4a3bc8) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:24:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab55", 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:03 executing program 2: r0 = socket$kcm(0x10, 0x7, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200000, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000180)={0x6, 0x2, 0x2, 0x84000}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4c2400, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000100)={0x3, [0xa5a, 0x6, 0x100000001, 0x6000000, 0xf8, 0xa8, 0x3, 0x7, 0x100000001, 0x8, 0x7e, 0x6, 0x3f, 0x394, 0x10001, 0x7ff, 0xff, 0x3, 0x5, 0x0, 0x4, 0xd0, 0x1, 0xffb, 0xd8, 0x80, 0x3, 0x7fff, 0xffff, 0x2, 0x3f, 0x3, 0x4, 0x475, 0x1, 0xffffffff, 0x7b, 0x8, 0x6, 0x3ff, 0x401, 0x1, 0xfffffffffffffc00, 0x7, 0x8, 0xfffffffffffffffc, 0x8, 0xfffffffffffffffd], 0xf}) 16:24:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:24:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:03 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1706.933860][T22996] XFS (loop3): Invalid superblock magic number 16:24:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x21e, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:24:04 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000200", 0x39}], 0x1}, 0x0) 16:24:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:24:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:04 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000400", 0x39}], 0x1}, 0x0) 16:24:04 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x800) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000180)=ANY=[@ANYBLOB="01000077f0000000000000003f903c9bcbddb8f38fd26bea467373628da8a0e906153f8f64b204d69108"]) 16:24:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1707.847393][T23054] XFS (loop3): Invalid superblock magic number 16:24:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x22a, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000880)) 16:24:05 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000a00", 0x39}], 0x1}, 0x0) 16:24:05 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x101, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000100)="08a41ffb0db681182d9ca0994d9bf781602ac284693786b3939c6b946f798fb2719f26b82a00cb587797869ec753856c4e7cd02bb1953d63a15cba4e8fb77fa425fff31dd429215f8b42f632a6e6281e3c78e9ab2f139cd8da4c20e422bead8ba041606aabf441408fdfa106925488ea57253317e112e414c5b6a591d929f67af79f60fd50dcc2cb1de53ebe15da34749a3d8368d25e9b548b45c1cd263bc5a95bda901fac8304c261dd00955ec4138abbd82784af43ca4508e260197218b3c8a1fc18b1f1a8fa51", 0xc8}, {&(0x7f0000000200)="fc58a8520f0111871146e4c838b431a2a79b717d6c6abb1d8f7df89a44754c9977da8791d96c2b56758dff95b877382a564d64aca1b84111df634526b9a35ee780803cf36b6ae2858d4cf692c9124f8a056fc6a49c017a8ada54a0cc2762c6461c05a7a21bfa4808f22ceeb43f14287931bcf71ecfc0360836889150ccc31abb0d9e9dd0cce4d78bcb5f5eb5bfeb7e5f9724b26fb233056df1a9f03d83fd266dddce23a85323d4bc0bec224070041e40f9c924f1f6a0ef1fea27ada1e97813945a4564e20f3b3addbb1ad4d27be49ce0894d29fe5f61ce53a41bb42e29", 0xdd}], 0x2}, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:24:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:24:05 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)='@\x00', 0x2, 0x1) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x1, "2cb646764f2e120581fb7b0859d666e8b7e6cdceb9ff167706abf707791ba190f89ddbd82d815458641a4be2e0d750feadb7c0657a78fb03c48e9a51dfc7a03b", "914cf5c59aad820da37c3ab2e51253c377aee67fe3a00543fc9b8a7210a295ef", [0x20, 0x58c]}) 16:24:05 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000f00", 0x39}], 0x1}, 0x0) 16:24:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:24:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000880)) [ 1708.706325][T23111] XFS (loop3): Invalid superblock magic number [ 1709.062807][T23142] XFS (loop3): Invalid superblock magic number 16:24:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x230, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:06 executing program 2: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x107) r1 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000006000", 0x39}], 0x1}, 0x0) 16:24:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:24:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, 0x0) 16:24:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000000a", 0x39}], 0x1}, 0x0) 16:24:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:06 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) socket$nl_generic(0x10, 0x3, 0x10) socket$kcm(0x29, 0x74073cbdca5ecebb, 0x0) socket$kcm(0x29, 0x7, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="7d00e5f9872af42ff8dc61af33f1f61bb15aade0068c8c3f7ecc3a2939c4f64cd2f390dc5603fcd46b685565d4ee8568db33cf705c5a2b287d824078298d4d381903b2ecc1931fb789f479e7bc8e3304828088c4e4fbdfb4434ef12df67a36366f8e2353a444da12ad33c3193548c8965d9778257864ab13a137a5964c3b4710e2bb9d75c53b8a7b0c2f8ba2010d9d43954a99bb46b651cf458c4f28bc04f2b3327d97877d56acf4cba6106eaf0671cb1c675318c65df3e9bf96cdafb47f4473f5bf95527009a907cf228e760d67da8fdd810fb87fc1", 0xd6) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:24:06 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000000f", 0x39}], 0x1}, 0x0) 16:24:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, 0x0) [ 1709.637768][T23169] XFS (loop3): Invalid superblock magic number [ 1710.048956][T23198] XFS (loop3): Invalid superblock magic number 16:24:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x255, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:24:07 executing program 2: r0 = socket$kcm(0x10, 0x400000000006, 0x4) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) fsync(r1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000100)={0x100000000, 0x1, {0x3, 0x2, 0xfff, 0x1, 0x14}}) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xffffff9f, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080020000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x10000000000000a8}, 0x0) 16:24:07 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000007018", 0x39}], 0x1}, 0x0) 16:24:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x18, 0x0, 0x0) 16:24:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:24:07 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000731a", 0x39}], 0x1}, 0x0) 16:24:07 executing program 2: r0 = socket$kcm(0x10, 0x80000000000004, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x5) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x1) 16:24:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:07 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000280)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) [ 1710.592807][T23222] XFS (loop3): Invalid superblock magic number 16:24:07 executing program 0: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x8}, &(0x7f0000000240), 0x0) [ 1711.013136][T23256] XFS (loop3): Invalid superblock magic number 16:24:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x25a, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:08 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000003a1b", 0x39}], 0x1}, 0x0) 16:24:08 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001f40)={&(0x7f0000001cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001d40)=""/195, 0xc3}], 0x1, &(0x7f0000001e80)=""/172, 0xac}, 0x100) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000027c0)={@local, @dev, 0x0}, &(0x7f0000002800)=0xc) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000002840)={r2, 0x1ff, 0x400, 0x7, 0x80000000, 0x3, 0x7}) 16:24:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:08 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x1}) 16:24:08 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000000)={0x0, 0x100}) 16:24:08 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3ff, 0x10000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000200)={r2, 0x1, 0x6}, 0x10) 16:24:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:08 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 16:24:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 16:24:08 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000001b3a", 0x39}], 0x1}, 0x0) 16:24:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1711.562593][T23280] XFS (loop3): Invalid superblock magic number [ 1712.009636][T23312] XFS (loop3): Invalid superblock magic number [ 1712.072672][T23312] BUG: MAX_STACK_TRACE_ENTRIES too low! [ 1712.078261][T23312] turning off the locking correctness validator. [ 1712.084574][T23312] CPU: 0 PID: 23312 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 1712.092537][T23312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1712.110446][T23312] Call Trace: [ 1712.113741][T23312] dump_stack+0x1d8/0x2f8 [ 1712.118049][T23312] mark_lock+0x52e/0x1850 [ 1712.122376][T23312] ? __bfs+0x5a0/0x5a0 [ 1712.126443][T23312] ? __kasan_check_read+0x11/0x20 [ 1712.131465][T23312] ? register_lock_class+0xb75/0x11a0 [ 1712.136821][T23312] ? is_dynamic_key+0x1c0/0x1c0 [ 1712.141648][T23312] ? __kasan_check_read+0x11/0x20 [ 1712.146673][T23312] ? __lock_acquire+0xd9a/0x4750 [ 1712.151586][T23312] __lock_acquire+0x737/0x4750 [ 1712.156328][T23312] ? trace_lock_acquire+0x1d0/0x1d0 [ 1712.161515][T23312] ? __kasan_check_read+0x11/0x20 [ 1712.166545][T23312] ? __lock_acquire+0xd9a/0x4750 [ 1712.171461][T23312] ? trace_lock_acquire+0x1d0/0x1d0 [ 1712.176644][T23312] ? trace_lock_acquire+0x1d0/0x1d0 [ 1712.181826][T23312] ? lockdep_unregister_key+0x660/0x660 [ 1712.187367][T23312] ? trace_lock_acquire+0x159/0x1d0 [ 1712.192543][T23312] lock_acquire+0x158/0x250 [ 1712.197022][T23312] ? flush_workqueue+0x162/0x13f0 [ 1712.202037][T23312] flush_workqueue+0x17e/0x13f0 [ 1712.206894][T23312] ? flush_workqueue+0x162/0x13f0 [ 1712.211902][T23312] ? drain_workqueue+0xb1/0x500 [ 1712.216729][T23312] ? __lock_acquire+0x4750/0x4750 [ 1712.221729][T23312] ? mutex_lock_io_nested+0x60/0x60 [ 1712.226941][T23312] ? rcu_work_rcufn+0xd0/0xd0 [ 1712.231621][T23312] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 1712.236892][T23312] drain_workqueue+0xb9/0x500 [ 1712.241546][T23312] destroy_workqueue+0x2b/0xb00 [ 1712.246408][T23312] xfs_destroy_mount_workqueues+0x8b/0x110 [ 1712.252201][T23312] xfs_fs_fill_super+0x11fd/0x1480 [ 1712.257388][T23312] ? set_blocksize+0x15d/0x3a0 [ 1712.262147][T23312] mount_bdev+0x27c/0x390 [ 1712.266476][T23312] ? xfs_fs_mount+0x40/0x40 [ 1712.270974][T23312] xfs_fs_mount+0x34/0x40 [ 1712.275300][T23312] legacy_get_tree+0xf9/0x1a0 [ 1712.279951][T23312] ? xfs_destroy_zones+0x310/0x310 [ 1712.285129][T23312] vfs_get_tree+0x8f/0x380 [ 1712.289531][T23312] do_mount+0x1835/0x26f0 [ 1712.293851][T23312] ? copy_mount_string+0x30/0x30 [ 1712.298787][T23312] ? trace_kmalloc+0xcd/0x130 [ 1712.303442][T23312] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1712.308979][T23312] ? copy_mount_options+0x5f/0x3c0 [ 1712.314069][T23312] ? copy_mount_options+0x308/0x3c0 [ 1712.319264][T23312] ksys_mount+0xcc/0x100 [ 1712.323496][T23312] __x64_sys_mount+0xbf/0xd0 [ 1712.328075][T23312] do_syscall_64+0xfe/0x140 [ 1712.332556][T23312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.338419][T23312] RIP: 0033:0x45c27a [ 1712.342375][T23312] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1712.362502][T23312] RSP: 002b:00007fe8e6551a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1712.370920][T23312] RAX: ffffffffffffffda RBX: 00007fe8e6551b40 RCX: 000000000045c27a [ 1712.378875][T23312] RDX: 00007fe8e6551ae0 RSI: 0000000020000780 RDI: 00007fe8e6551b00 [ 1712.386850][T23312] RBP: 0000000000000000 R08: 00007fe8e6551b40 R09: 00007fe8e6551ae0 [ 1712.394797][T23312] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1712.402760][T23312] R13: 00000000004c8925 R14: 00000000004df5b0 R15: 00000000ffffffff 16:24:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x272, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:09 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x800, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000140)={0xf, {0x81, 0x3, 0x7ff, 0xeef3}}) r1 = socket$kcm(0x10, 0x5, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000080)) 16:24:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:09 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:09 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000003f", 0x39}], 0x1}, 0x0) 16:24:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:09 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000040", 0x39}], 0x1}, 0x0) 16:24:09 executing program 2: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2) write$eventfd(r1, &(0x7f0000000080)=0xfffffffffffffffa, 0x8) [ 1712.692454][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1712.699635][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1712.718042][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1712.728644][ T2508] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1712.740235][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1712.754369][T23330] EXT4-fs (loop2): unable to read superblock [ 1712.774215][ T2508] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1712.778608][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env 16:24:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 1712.791805][T23342] EXT4-fs (loop2): unable to read superblock [ 1712.799055][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1712.816284][T23345] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1712.823792][T23345] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1712.871000][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1712.883337][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1712.898563][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1712.911295][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1712.922171][T23345] XFS (loop3): Invalid superblock magic number [ 1712.946941][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1712.960712][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1712.978657][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1712.986517][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1713.000987][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1713.008849][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1713.023046][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1713.030845][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1713.045298][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1713.052745][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1713.142037][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1713.149199][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1713.222201][T23345] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1713.229420][T23345] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1713.240739][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1713.248058][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1713.260115][T23372] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1713.267309][T23372] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x276, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:10 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:10 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000060", 0x39}], 0x1}, 0x0) 16:24:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:10 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000001870", 0x39}], 0x1}, 0x0) 16:24:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1713.593428][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1713.600595][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1713.614469][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1713.632476][ T2508] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:24:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1713.643740][T23385] EXT4-fs (loop2): unable to read superblock [ 1713.658099][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:10 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:10 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000001a73", 0x39}], 0x1}, 0x0) [ 1713.711571][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1713.723122][T23397] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1713.746004][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1713.756975][T23397] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1713.770287][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1713.778175][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1713.815681][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1713.824991][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1713.842126][ T2507] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1713.855443][T23407] EXT4-fs (loop2): unable to read superblock [ 1713.878258][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1713.897680][T23397] XFS (loop3): Invalid superblock magic number [ 1713.918647][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1713.930525][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1713.938369][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1713.955638][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1713.963823][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1714.222044][T23397] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1714.229274][T23397] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1714.250586][T23422] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1714.257775][T23422] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1714.291691][T23422] XFS (loop3): Invalid superblock magic number [ 1714.298552][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1714.305769][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x279, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000040", 0x39}], 0x1}, 0x0) 16:24:11 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 16:24:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000003", 0x39}], 0x1}, 0x0) 16:24:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1714.711973][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1714.719175][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1714.737736][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1714.745610][ T2508] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:24:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 16:24:11 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) [ 1714.763296][T23436] EXT4-fs (loop2): unable to read superblock [ 1714.799113][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:11 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1714.843412][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1714.851611][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1714.851695][T23451] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1714.867803][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1714.876548][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' 16:24:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 1714.893437][T23451] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1714.935491][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1714.948525][ T2507] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1714.960384][T23459] EXT4-fs (loop2): unable to read superblock [ 1714.982930][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1715.024301][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1715.034236][T23451] XFS (loop3): Invalid superblock magic number [ 1715.037491][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1715.074941][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1715.082816][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1715.095607][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1715.103391][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1715.171969][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1715.179284][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1715.362092][T23451] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1715.369387][T23451] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1715.395157][T23478] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1715.403690][T23478] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1715.437425][T23478] XFS (loop3): Invalid superblock magic number [ 1715.444742][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1715.452180][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x280, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:12 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 16:24:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 16:24:12 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1715.821960][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1715.830694][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1715.849580][ T2507] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:24:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1715.868453][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1715.876278][T23492] EXT4-fs (loop2): unable to read superblock [ 1715.911079][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' 16:24:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000023c0), 0x1000000000000252) 16:24:12 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) [ 1715.947092][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1715.956864][T23503] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1715.964310][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1715.988090][T23503] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1716.035539][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1716.046869][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1716.067195][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1716.084652][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1716.100722][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1716.108192][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1716.119665][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1716.127283][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1716.129029][T23503] XFS (loop3): Invalid superblock magic number [ 1716.138650][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1716.151363][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1716.237820][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1716.245134][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1716.392013][T23503] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1716.399169][T23503] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1716.412171][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1716.419327][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x296, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:13 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 16:24:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 16:24:13 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000023c0), 0x1000000000000252) [ 1716.442620][T23527] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1716.450122][T23527] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:13 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 16:24:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) 16:24:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000023c0), 0x1000000000000252) 16:24:13 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1716.553141][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1716.560360][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1716.582456][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1716.589710][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:24:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 1716.625198][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1716.650277][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1716.692110][T23555] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1716.700117][T23555] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1716.715809][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1716.734770][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1716.754246][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1716.761870][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1716.773768][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1716.781109][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1716.796343][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1716.804044][T23555] XFS (loop3): Invalid superblock magic number [ 1716.810559][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1716.822213][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1716.829495][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1716.852411][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1716.859667][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1717.072087][T23555] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1717.079336][T23555] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1717.090753][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1717.098073][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1717.106008][T23573] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1717.116440][T23573] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1717.147968][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1717.159635][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x2b0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:14 executing program 1: mknod$loop(0x0, 0x10020106002, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 16:24:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:24:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:14 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:24:14 executing program 1: mknod$loop(0x0, 0x10020106002, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:14 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) [ 1717.391983][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1717.399156][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1717.421390][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env 16:24:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 16:24:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 1717.459612][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1717.481549][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1717.498400][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1717.524268][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1717.537189][T23603] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1717.544748][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1717.558557][T23603] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1717.577863][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1717.589548][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1717.634016][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1717.653245][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1717.666372][T23603] XFS (loop3): Invalid superblock magic number [ 1717.972020][T23603] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1717.979240][T23603] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1717.990715][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1718.011984][T23620] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1718.014160][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1718.019238][T23620] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x2b1, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:15 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:15 executing program 1: mknod$loop(0x0, 0x10020106002, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:15 executing program 2: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:24:15 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:15 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:24:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 1718.282979][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1718.290999][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1718.309185][ T2507] blk_update_request: I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1718.310677][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1718.326735][T23634] EXT4-fs (loop4): unable to read superblock [ 1718.350127][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:24:15 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1718.400249][T23644] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1718.413577][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1718.440670][T23644] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1718.445609][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1718.480561][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1718.488212][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1718.506458][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1718.520648][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1718.538129][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1718.545993][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1718.557642][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1718.565496][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1718.590642][T23644] XFS (loop3): Invalid superblock magic number [ 1718.941933][T23644] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1718.949187][T23644] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1718.960778][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1718.975438][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1718.986451][T23665] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1718.993984][T23665] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x2b2, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:15 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) 16:24:15 executing program 2: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:24:15 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:16 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:24:16 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000000000", 0x39}], 0x1}, 0x0) [ 1719.161990][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1719.169144][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1719.180686][ T2508] blk_update_request: I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1719.201800][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1719.211621][T23680] EXT4-fs (loop4): unable to read superblock [ 1719.230003][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:24:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 16:24:16 executing program 2: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) [ 1719.266324][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1719.289360][T23692] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1719.297489][T23692] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1719.297605][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1719.336980][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1719.345017][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1719.365848][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1719.373802][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1719.384870][T23692] XFS (loop3): Invalid superblock magic number [ 1719.385640][ T2507] blk_update_request: I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1719.402555][T23700] EXT4-fs (loop4): unable to read superblock [ 1719.405836][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1719.415873][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1719.430419][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env [ 1719.438186][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1719.453839][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1719.460999][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1719.479343][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1719.487395][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1719.692036][T23692] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1719.699212][T23692] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1719.722059][T23713] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1719.730020][T23713] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x2b3, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:16 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:24:16 executing program 2: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:24:16 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000ffff", 0x39}], 0x1}, 0x0) 16:24:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:16 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000ffff", 0x39}], 0x1}, 0x0) 16:24:16 executing program 2: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1720.001856][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1720.015574][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:16 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 1720.045295][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env 16:24:17 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a0000000000ffff", 0x39}], 0x1}, 0x0) [ 1720.093754][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1720.142519][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1720.174224][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1720.175057][T23743] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1720.209330][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1720.231419][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1720.255666][T23743] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1720.259345][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1720.289631][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1720.317885][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1720.342364][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1720.364598][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1720.380811][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1720.391474][T23743] XFS (loop3): Invalid superblock magic number [ 1720.692156][T23743] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1720.699412][T23743] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1720.711128][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1720.718989][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1720.730307][T23759] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1720.737606][T23759] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:24:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x2da, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@gquota='gquota'}, {@usrquota='usrquota'}]}) 16:24:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:17 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:17 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000007fff", 0x39}], 0x1}, 0x0) 16:24:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 16:24:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:24:17 executing program 5: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) 16:24:17 executing program 4: r0 = socket$kcm(0x10, 0x80000000000003, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f080000000470470000883795c0c54c1960dbb7d553b4a421556b3d5df5000a00000000009eff", 0x39}], 0x1}, 0x0) 16:24:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 16:24:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:24:17 executing program 1: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020106002, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) [ 1720.942288][T22020] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1720.957230][T22020] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1720.972648][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1721.007852][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1721.042043][T23785] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1721.048184][ T3902] kobject: 'loop4' (000000009354ecfd): kobject_uevent_env 16:24:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1721.049218][T23785] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1721.066243][T23782] kobject: '7:10' (00000000b17953a9): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1721.089285][ T3902] kobject: 'loop4' (000000009354ecfd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1721.107199][T23782] kobject: '7:10' (00000000b17953a9): kobject_uevent_env [ 1721.118070][T23782] kobject: '7:10' (00000000b17953a9): fill_kobj_path: path = '/devices/virtual/bdi/7:10' [ 1721.118816][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1721.128974][T23782] kobject: 'loop10' (00000000c8352cdf): kobject_add_internal: parent: 'block', set: 'devices' [ 1721.138662][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1721.149417][T23782] kobject: 'loop10' (00000000c8352cdf): kobject_uevent_env [ 1721.162614][ T3902] kobject: 'loop0' (00000000a3dcd494): kobject_uevent_env [ 1721.167907][T23782] kobject: 'loop10' (00000000c8352cdf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1721.170413][ T3902] kobject: 'loop0' (00000000a3dcd494): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1721.185069][T23782] kobject: 'holders' (0000000050981096): kobject_add_internal: parent: 'loop10', set: '' [ 1721.217595][T23782] kobject: 'slaves' (0000000055568dd0): kobject_add_internal: parent: 'loop10', set: '' [ 1721.230753][T23782] kobject: 'loop10' (00000000c8352cdf): kobject_uevent_env [ 1721.239893][T23782] kobject: 'loop10' (00000000c8352cdf): fill_kobj_path: path = '/devices/virtual/block/loop10' [ 1721.250696][T23782] kobject: 'queue' (00000000892202c0): kobject_add_internal: parent: 'loop10', set: '' [ 1721.261487][T23782] kobject: 'mq' (00000000ab175ddd): kobject_add_internal: parent: 'loop10', set: '' [ 1721.271679][T23782] kobject: 'mq' (00000000ab175ddd): kobject_uevent_env [ 1721.278596][T23782] kobject: 'mq' (00000000ab175ddd): kobject_uevent_env: filter function caused the event to drop! [ 1721.289226][T23782] kobject: '0' (000000008f3f0bf9): kobject_add_internal: parent: 'mq', set: '' [ 1721.298797][T23782] kobject: 'cpu0' (0000000075cfb14f): kobject_add_internal: parent: '0', set: '' [ 1721.308481][T23782] kobject: 'cpu1' (000000009eac583c): kobject_add_internal: parent: '0', set: '' [ 1721.319240][T23782] kobject: 'queue' (00000000892202c0): kobject_uevent_env [ 1721.326376][T23782] kobject: 'queue' (00000000892202c0): kobject_uevent_env: filter function caused the event to drop! [ 1721.337698][T23782] kobject: 'iosched' (000000002df101ea): kobject_add_internal: parent: 'queue', set: '' [ 1721.347994][T23782] kobject: 'iosched' (000000002df101ea): kobject_uevent_env [ 1721.355301][T23782] kobject: 'iosched' (000000002df101ea): kobject_uevent_env: filter function caused the event to drop! [ 1721.366375][T23782] kobject: 'integrity' (000000003ac566ec): kobject_add_internal: parent: 'loop10', set: '' [ 1721.376981][T23782] kobject: 'integrity' (000000003ac566ec): kobject_uevent_env [ 1721.384485][T23782] kobject: 'integrity' (000000003ac566ec): kobject_uevent_env: filter function caused the event to drop! [ 1721.421578][ T2508] blk_update_request: I/O error, dev loop10, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1721.432665][T23782] EXT4-fs (loop10): unable to read superblock [ 1721.453612][T23785] XFS (loop3): Invalid superblock magic number [ 1721.469980][ T3902] kobject: 'loop2' (000000004d456dfc): kobject_uevent_env [ 1721.478025][ T3902] kobject: 'loop2' (000000004d456dfc): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1721.489697][ T3902] kobject: 'loop5' (00000000d0167da7): kobject_uevent_env [ 1721.497024][ T3902] kobject: 'loop5' (00000000d0167da7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1721.732528][T23785] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1721.739824][T23785] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1721.761147][T23810] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1721.768445][T23810] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1721.806656][ T3902] kobject: 'loop3' (00000000114ccb4b): kobject_uevent_env [ 1721.813907][ T3902] kobject: 'loop3' (00000000114ccb4b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1721.824421][T23810] XFS (loop3): Invalid superblock magic number