AL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, &(0x7f00000002c0)) pivot_root(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="79d28df8fa50"], 0x6) fallocate(r0, 0x3, 0x0, 0x8020001) 20:11:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2615ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2cb0352b3a8a38867b2d08b279b98ffa00"/178, 0xb2}], 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x400, 0x0) recvfrom$unix(r0, &(0x7f0000000340)=""/139, 0x8b, 0x2, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e24}, 0x6e) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='minix\x00', 0x10010, &(0x7f0000000180)='em1\x84[\x00') [ 1947.909388][ T8716] XFS (loop2): bad version [ 1947.915566][ T8716] XFS (loop2): SB validate failed with error -22. 20:11:49 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000480)='/dev/adsp#\x00', 0x81, 0x2000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000340)={0x5, 0x2, {0x2, 0x3, 0x7, 0x1}}) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8, 0x280) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000003c0)=0x1b) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000540)={'lapb0\x00', 0xfffffffffffffff8, 0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000240)) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000400)={0x1, @default, @bpq0='bpq0\x00', 0x1, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x100, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000180)={{0x7, 0x3}, 'port0\x00', 0x42, 0x1000, 0x9, 0x0, 0x1, 0x1, 0xfffffffffffffc01, 0x0, 0x7, 0x7}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200040, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000640)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)) ioctl$VT_DISALLOCATE(r2, 0x5608) 20:11:49 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x103100, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xaaaaaaaaaaaab55, &(0x7f0000000040)=[{&(0x7f0000000200)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) [ 1948.173650][ T26] audit: type=1800 audit(1563999109.872:363): pid=8862 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17184 res=0 20:11:49 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) 20:11:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000003680)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000036c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000003700)={r0}) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000200)=0x80) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5c0100001800000028bd7000fddbdf251c2020fffe03fd050016000014001200040011500187c8fc1c7f24b65370c9e584001300000000000000000000000000000000000000010000000a0000000fe8cb0000000000000000000000ffff8f00000000000000800000000c00ffff0f0000000000000000000000000000000c0000000000000000000000030000000000000000000000000000000f00000001000000010000000000000008000800040000000000000000002e1da466eb6757fed9957414be566e850a862978adf3c8aed2e5b418f6", @ANYRES32=r2, @ANYBLOB="8400130000000000000000000000070000000000ffff0f000000000000000f0000000100000000000000000000200000000000000000000000000400ffff0f0000000000800000000000000000008f0000000000000000000000050000000000000000000000800000000000000000000000000000000000ffff0f00000000006e6b06001400120013007c3a2099ae57000efe4152d24eaf08001a0009000000"], 0x15c}, 0x1, 0x0, 0x0, 0x4010}, 0x80) 20:11:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:50 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x42200, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000200)=0x1, &(0x7f0000000240)=0x4) r1 = syz_open_dev$amidi(0xfffffffffffffffe, 0x80000000, 0x80) sendmmsg(r1, &(0x7f00000000c0)=[{{0x0, 0xfe4f, &(0x7f0000000000)=[{&(0x7f0000000340)="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", 0x1000}], 0x283, 0x0, 0xffffff76}}], 0x400000000000154, 0x4000000) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) [ 1948.722066][ T9054] XFS (loop2): bad version [ 1948.728296][ T9054] XFS (loop2): SB validate failed with error -22. 20:11:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x33e, 0x200007ff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x0, 0x0, [0x9c00, 0x0, 0xa8, 0xd802, 0x8400000000000000]}}, 0xfef5) 20:11:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000180fffff10000000000000007000000000000004b000000000000000100000000000000000000000000000000000000000000000000000000000000eff2ffff010000000d00000000000000020000000000000000000080000000000000000000000000000000000000007f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007e9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb00000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c2e577d90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000005790fcad00"/768]) getsockopt$inet_int(r0, 0x0, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000200)) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000001c0)={0x980000, 0xf7, 0x2, [], &(0x7f0000000180)={0x9a0903, 0xfd2, [], @string=&(0x7f00000000c0)=0x8}}) 20:11:50 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}, 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = getuid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x100041, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e22,msize=0x0000000000000002,fscache,dfltuid=', @ANYRESHEX=r0, @ANYBLOB="2c7665727369636e3d3970323030302e752c6f626a5f726f6c65af6c0044002c6f626a5f757365723d5e2c7569643edcb5cad902d749e945d0480dfe86a4567e1fe99b13d928709c22a023c12de21db99056e7e16942e68df6bc3b9cc0c19903f6e83667f3d5268a73380900000000000000fb731a6a8c68e289bb72dfaefda7ec7ab15616499616ef88193d4c309038bd5eccd63ec9e9ae17020930fa229f6c28898acbd8dfea11f62d899a296736696e4dd3bbab3611a27068c9f5fd0cb17b719b11be0437c08d78f5834a5d7037514db580c9be98091143b20bab", @ANYRESDEC=r1, @ANYBLOB="2c7375626a5f726f6c653d6d643573756d2c657468302b2d776c616e31766d6e65743075736572757365722c6f626a5f726f6c653d786673002c66736e616d653d2c6673636f6e746578743d756e636f6e66696e65645f752c6673757569643d37686373773736372d3d3737662d367d62772d3075617f2d76397f33637634322c00"]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)) 20:11:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:50 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x6, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000500)}}, &(0x7f00000005c0)) r0 = open$dir(0x0, 0x400, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4, 0xffffffffffffff71}, {0x99e1, 0xffff}]}, 0x14, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockname$inet6(r1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = gettid() ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000400)=""/221) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) 20:11:51 executing program 5: r0 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000a80)=0xe8) mount$9p_unix(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='./file1\x00', &(0x7f0000000940)='9p\x00', 0x4, &(0x7f0000000ac0)={'trans=unix,', {[{@access_uid={'access', 0x3d, r0}}, {@access_client='access=client'}, {@access_uid={'access', 0x3d, r1}}, {@access_any='access=any'}, {@access_any='access=any'}, {@cache_fscache='cache=fscache'}, {@access_any='access=any'}], [{@obj_user={'obj_user', 0x3d, 'xfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'nfs4\x00'}}]}}) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x7, &(0x7f0000000780)=[{&(0x7f00000001c0)="a8ab48b5a8de76495e684b653a70f8c22b97c2cc88b191f4334be61e6da54786df2f0e3a99f3acb9d320841df487d62b2e916af6826f4571b36a762f3e17e34706a5e52e954d12973adc6e05fcffe43faaaa043be027e5af4998dc8b5c9c767adda6929bd2e753e7514a2cdba35628ca4fbc873689845162cd77724550bde67467ddb24d100303e1b77f35800e3d7136ba5d196c0d5f4fd053bed62de8aae033a7177f12c41c8ff3f7676d10a80655606e15d059d352d19f82d9875454ad5d0eb71507c4baea6364b224e15cdf769c7d718235750b739958", 0xd8, 0x8}, {&(0x7f0000000340)="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", 0xfa, 0x43b}, {&(0x7f0000000440)="1e232276a388e7d3d761f4f5853ae8bcd7006164c3d8f67dcec7bb3886044be484dae6fec5b17ae74b745413e30ea58980ca5b5240fe12f65acb18a1655ff15ed1680947f2017887b640b0f2", 0x4c, 0xff}, {&(0x7f00000004c0)="8d5f69a1c97ef411ed6b1bdc2254cf6850add95661b5ffbbdbf6ecc17e293bb6fb1e07e86171588b88cdae194548be0577676bfd7a3ce7f240ef65056120c3a89812d2e0beb646ec207ce78f03d25b52cc214bf47d8cd15b041e8a103f8afabf612f", 0x62, 0x3}, {&(0x7f0000000540)="cb32959f83696bc36e760c8b4c2e515e218334fd8e5969a946e1115bdaca7a5beccd5d9f7b9d548dc7f9110d33e5707c730d81de67a7fff80f6f15bfec1f2b84571c1593e1d9ee142a6bf17d9aec6c1b2c1d597e73f3c9615e15bb8141289d9cbafa80f390545c2b450625d41c1ba79cd4a4b7d7ab85819e38cf3bf8d162cbf8166a436a2dbf0565e06ed6d0679613e894666a44016134a3386d53233b2002a0c1819ce039505e7925bdb68c7bc694bf60a392", 0xb3, 0x1}, {&(0x7f0000000600)="bbcd33069f0e779e68b7064d6c1f374a594d6ef7e8abdc752ae842c6ec2fbe71caa28890af667403665311a2775a955b9cfbf45e406bbb788db4041d388ee9595bd36087bcf58c7a1972f5e455c566244d5555a130962432040a479285718577bb3252f55ceadbd1110272da841d1d5f50d168cb372852fdf3ff1d273b828dbeaeb73ba699040943520aea5d614b8f6b507a56fa052e84aa8de7c4c8d86024b6d3e0244d09", 0xa5, 0x9}, {&(0x7f00000006c0)="5d20151e790b1ef682ce27712237f6d4ef7a98fc1141f5dc087e942dbafd092c22ab643ad5e6bc770799fda7483ba1c2b4f04720968b8225a9c434b38a8dbba4ea1c770fcf4818c05bea5c9882fd45fd2854f6f38571c502cae0a3e57e7872e4c1c62a36190fe016154497f769c409474c7e15911571efd356d909addd342f35c765b675", 0x84, 0x3}], 0x2000000, &(0x7f00000002c0)='xfs\x00') syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000840)='/dev/input/mice\x00', 0x0, 0x10000) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000880)={0xa, 0x7, 0x80000001, 0x5}, 0xa) 20:11:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x13000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 1949.446832][ T26] audit: type=1800 audit(1563999111.152:364): pid=9245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17134 res=0 20:11:51 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = semget$private(0x0, 0x7, 0x301) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f00000001c0)=""/74) 20:11:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0xfffffffffffffffc, 0x0) [ 1949.805728][ T9336] XFS (loop2): bad version [ 1949.838029][ T9336] XFS (loop2): SB validate failed with error -22. 20:11:51 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000500)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000001cd94bc59f"], 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x40000) unlink(&(0x7f00000000c0)='./file0\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'syz_tun\x00'}) 20:11:51 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000200)={0x2, 0x95b, &(0x7f00000000c0)="5ed5b858c2d1b66f5443eecfdb68fa48594e8bba7f8b68e4d70ec3c7560a5cbea1132cac802b15bcfc9421d0c69b769d691702f3aa0e03b51c9ef85b9f2885d442968299271d911e01e11028aebafdb808db60c62c0fc9d16282a32c1dd8a43232bed7fd689e2bb70c81ddb57bba997069f4c448016a3406309430e9cdb79aa20bf3ff6a557c1474891191a1e9477aebfa122d004dc2c09325142eef52a5944430b587b56a883d33495a297948cff0a6abe4376bff26c6509b8651f7539e36e4552fb600b64f0814b1649796f2d7016dfa96905147a9889fa35b9854f15edb8bfff2d2", &(0x7f00000001c0), 0xe3}) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0xaaaac5a, &(0x7f0000000040), 0x10, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x200000) dup3(r2, r2, 0x80000) tee(r1, r2, 0x9, 0x8) 20:11:52 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffdfffff, 0x3d9, &(0x7f0000000040)=[{&(0x7f00000001c0)="00080000c23344d052a1286e5a1cc8a28c6d9e9e85a3f0cd039bad97f2c099f3c33e5a72000040aa825ae4b73c4116f851f958dc4541ec520533db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c850000c25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xbf, 0xfffffffffffffffc}], 0x3, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x401, 0x103000) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f00000013c0)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000001300)={@isdn={0x22, 0x8, 0x604, 0xfffffffffffffffa, 0x8000}, {&(0x7f00000002c0)=""/4096, 0x1000}, &(0x7f00000012c0), 0x2}, 0xa0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000080, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000140)="09f28cf8136558bfa72c9d9505e393fedcb528559cc2458c3731a88c77c0596e25b514ba34b6568ad203652491a3d6a011be926393156b6087fd49a6722ee1264b0352f8e11f0cc1a46b90852ec510cdef76236045ebc06a63bfde20f67f0654b49d6cf44fbc0b16800942fafff2edf1fa943019c2"}, 0x10) 20:11:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3b000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 1950.606542][ T26] audit: type=1800 audit(1563999112.312:365): pid=9635 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17210 res=0 20:11:52 executing program 4: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) open(0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, 0x0) 20:11:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x2) 20:11:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 1950.979993][ T9693] XFS (loop2): bad version 20:11:52 executing program 0: lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x286}, 0x28, 0x1) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 1951.006639][ T9693] XFS (loop2): SB validate failed with error -22. 20:11:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x3e, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"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"}) 20:11:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x26}], 0x0, 0x0) 20:11:53 executing program 4: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) open(0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, 0x0) 20:11:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x3}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:53 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r1, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000015}, 0x4005) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40080000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipmr_getroute={0x1c, 0x1a, 0x400, 0x70bd27, 0x25dfdbfe, {0x80, 0x10, 0x34, 0x7, 0xff, 0x2, 0xff, 0xf, 0x1100}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x4000004) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) 20:11:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$netrom(r0, &(0x7f00000001c0)=""/220, 0xdc, 0x40010001, &(0x7f0000000340)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast]}, 0x48) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x52) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) 20:11:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 1951.852792][ T26] audit: type=1800 audit(1563999113.552:366): pid=9901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17174 res=0 20:11:53 executing program 4: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) open(0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, 0x0) [ 1952.058395][ T9954] XFS (loop2): bad version [ 1952.072460][ T9954] XFS (loop2): SB validate failed with error -22. 20:11:53 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x2) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='md5sum\x00'}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)={0x9000200a}) sendto$inet(r0, &(0x7f0000000140)="86bd474160982f480578c5a70ea9bd842346a15d0bdfc9d450c48e56759cfc7f81cfdaccc4ac33741020e3e2", 0x2c, 0x800, &(0x7f0000000180)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0x6) 20:11:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:54 executing program 0: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67, 0x400000000000}], 0x0, 0x0) 20:11:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000100)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 20:11:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0x80) ioctl$int_in(r0, 0x5473, &(0x7f00000000c0)=0x9) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000200)={0x0, &(0x7f00000001c0), 0x1, r0, 0x9}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6c, @remote, 0x4e20, 0x1, 'sed\x00', 0x7, 0xf6db, 0x29}, 0x2c) 20:11:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0xae64, 0x0) 20:11:54 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:54 executing program 0: openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x80201, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000180)) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) socket$packet(0x11, 0x2, 0x300) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000340)) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0407faf100cc0602b9"], 0x9, 0x1) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000001c0)) 20:11:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffff0402, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8000) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x70, 0x9, 0x8, 0xfb, 0x135b75aa, 0x0, 0x3, 0x1000, 0x8, 0x8000, 0x10000, 0x8, 0x1, 0x6, 0x0, 0x400, 0x3, 0x1, 0x0, 0x8001, 0x4, 0x2, 0x7ef, 0x6, 0x8, 0xfc60, 0xe6bf, 0x5, 0x54cb, 0x1, 0xfffffffffffffffe, 0x9, 0x3, 0x0, 0xfffffffffffffc01, 0x7ff, 0x2, 0x0, 0x153, 0x2, @perf_config_ext={0x7, 0xffff}, 0x840, 0x5, 0x4, 0x8, 0x40, 0x7670d4eb, 0x20}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='xfs\x00', 0x0, r1) [ 1952.964293][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1952.970288][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1953.149854][ T26] audit: type=1800 audit(1563999114.852:367): pid=10230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17211 res=0 20:11:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 1953.204036][T10164] XFS (loop2): bad version [ 1953.215405][T10164] XFS (loop2): SB validate failed with error -22. 20:11:55 executing program 0: syz_open_dev$loop(0x0, 0xffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x33e, 0x200007ff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x0, [0x9c00, 0x0, 0xa8, 0xd802, 0x8400000000000000]}}, 0x20) 20:11:55 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000080)={0x100000001}, 0x0) 20:11:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0xfffffffffffffffc, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) 20:11:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000240)={'yam0\x00', 0x4}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000280)={0x7, 0x9}) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) delete_module(&(0x7f0000000000)='xfs\x00', 0x200) listen(r0, 0x86e) r2 = perf_event_open$cgroup(&(0x7f00000001c0)={0x7, 0x70, 0xff, 0x4, 0xffffffffffffffc0, 0x1, 0x0, 0x3, 0x2b000, 0x0, 0x8001, 0x1, 0x8, 0x8, 0x7, 0x1, 0xffff, 0x20, 0x6, 0x3, 0x0, 0x8, 0x9, 0xcdb6, 0x2, 0x80, 0x9, 0x3, 0x7, 0xfff, 0x3ff, 0x3, 0x7, 0x0, 0x7, 0x6, 0x100000001, 0x7, 0x0, 0x6016, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x10284, 0x1, 0x6, 0x6, 0x80000000, 0x23e0, 0x1f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl(r2, 0x2, &(0x7f0000000340)="6e3af38b1e5fa365f5ee68211c49438d4dfef65286c32c38f00577671865c63ecb0813ad6355f34b2d885b319c8b9e4b8d8c4c5011df0ff07e6c80a20e50cfa6db6c945c5aabde5ccac37e5a3a94a886977d729aea5e4c8af4e04e48d1c798a1ebfe42a5a21cfb16716e5676c4ae54933865e2f07b04d881c6077ad50a3d2d004897e03e47b1d70df9fd09c91371c37f6db28d122c6179e4ea6a3193ea62625cf0e124bd0e9f60f08c56b128d29c769f6a4bf162a7fdbe410adda576a2f56dd9fae655d049dfa2c0e3") 20:11:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@nosuiddir='nosuiddir'}, {@data_writeback='data=writeback'}, {@quota_on='quota=on'}]}) [ 1954.011471][T10428] gfs2: not a GFS2 filesystem 20:11:55 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 1954.163826][T10428] gfs2: not a GFS2 filesystem 20:11:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xfffffffffffffe1b}], 0x0, 0x0) 20:11:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x409, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 20:11:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, 0x0) [ 1954.313090][ T26] audit: type=1800 audit(1563999116.012:368): pid=10484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17215 res=0 [ 1954.405402][T10477] XFS (loop2): bad version [ 1954.410059][T10477] XFS (loop2): SB validate failed with error -22. 20:11:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:56 executing program 0: rt_sigaction(0x0, 0x0, 0x0, 0x8, &(0x7f0000000300)) 20:11:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x2, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa17403"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:57 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x10}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) munlock(&(0x7f0000cc1000/0x4000)=nil, 0x4000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x41, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, &(0x7f0000000140)={0x1bb}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) iopl(0x0) 20:11:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="58465342c23344d0a3f0cd039bad4aed0784f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec543962d89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b0408b279b98ffa647f6b836165d3f51fee8fbbe286160527c5ac606b2f6b420affc8d87e92", 0xd6}], 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000001380)='/dev/adsp#\x00', 0x83ee, 0x101000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x8000, @mcast1, 0x7}}, [0x1f, 0x9, 0x7, 0x3, 0x4, 0x944, 0x6, 0x7, 0x7fff00000, 0x4, 0x1ff, 0x7, 0x5, 0x8, 0x81]}, &(0x7f00000002c0)=0x100) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000340)={r1, 0x800, 0x1000, "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"}, 0x1008) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001440)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000001480)=0x18) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000013c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000001640)={0x2, [0x0, 0x0]}, &(0x7f0000001680)=0xc) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000001400)=""/7) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000001500)={'filter\x00', 0xc9, "ca25fc46a7b44794ae6794f6301074935e6c01f3a60257fb52d875391187a27864bd62e0c911dffd2dc9760a98d89b5b93864ed4bc6c163e080b7deed12df3bdf3047f75be572f780b289deb24c975e20511112f322f6561c185a37c4bd26ced92d7de6049ba851a452db265b673875629f7d948e676b2f79f897f2aa97fe087cea33ed4b6244cda8e499c1268b36fd052bcfec885d898eaee5d1ae97363c8b68f0734bebe2fa6364008b1e4707bfc2f0486d276da12b4ea5852d4258ab363720cd6c50d99890a1ad0"}, &(0x7f0000001600)=0xed) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r2, &(0x7f00000014c0)=0x4) 20:11:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa17403"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 1955.342374][ T681] XFS (loop2): bad version [ 1955.351038][T10623] XFS (loop2): SB validate failed with error -22. [ 1955.365708][ T26] audit: type=1800 audit(1563999117.072:369): pid=10641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17220 res=0 20:11:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) [ 1955.556343][ T26] audit: type=1800 audit(1563999117.262:370): pid=10770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17198 res=0 20:11:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa17403"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) 20:11:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000100)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 20:11:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e0"], 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000100)={@nfc_llcp={0x27, 0x1, 0x1, 0x5, 0x1, 0xffffffffffff7fff, "41f9c5faf8053e85a48511bb434d0d639dd5c3c1baa16de9921ece1f750dc40207580b7cc55489dc87125631f522e409228c3a6310ce1d5148afe1141bf40b", 0x3e}, {&(0x7f0000000040)=""/7, 0x7}, &(0x7f00000000c0), 0x10}, 0xa0) [ 1956.223808][T10869] XFS (loop2): bad version [ 1956.228821][T10869] XFS (loop2): SB validate failed with error -22. 20:11:58 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x300}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x506, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 20:11:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e0"], 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:58 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x1d}, 0x14) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80001, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f00000001c0)={0x0, 0xae39, 0x7fffffff, &(0x7f00000000c0)=0x6}) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) 20:11:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e0"], 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x80) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/168) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x3}) [ 1956.735232][ T26] audit: type=1800 audit(1563999118.442:371): pid=10952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16946 res=0 20:11:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x4, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93"], 0xb) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x506, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1957.156056][T11024] XFS (loop2): bad version [ 1957.170783][T11024] XFS (loop2): SB validate failed with error -22. 20:11:59 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x900}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:59 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xf8cf8a0e713ca6d1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x28401, 0x20) getsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000340)=""/255, &(0x7f00000001c0)=0xfd22) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000240)='xfs\x00', 0x4) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000040), 0x3, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x14) 20:11:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93"], 0xb) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 20:11:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x506, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 20:11:59 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93"], 0xb) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) [ 1957.753817][ T26] audit: type=1800 audit(1563999119.452:372): pid=11062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16534 res=0 20:11:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x5, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:11:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0xc) 20:11:59 executing program 5: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000001540)='./file0\x00', 0x10000000ffffffff, 0x7, &(0x7f00000013c0)=[{&(0x7f0000000100)="5d0863056442861cc10d77985110603fdee63c9b930aeaab54071b89185f07e9854a6cd12ca23d77b448e05ad8dfd6a4b181e0be853a71ed67fa0257b1c870205c3d3159da118084f15ce3cd594bc7fac300f44b178ba87ff17089d0756eea271742a1c35f15fa2175a51769473ea3ca8504853add4feffd5e5f2470ec90e5c7e19f10187197f3ae73ea9f9af63afadd3d92b83e129cfaf4c6e5562de8f92019f291279a53c4bffec6b06a93604520e08327b27770f076c28390a102f7bf8d9458927e94d5dec709ebb91ce3", 0xcc, 0x3ff}, {&(0x7f0000001480)="6d05f7a275a36b89d3126ceadbbc2ad275d5538d005a4b82697cf97a83c84fadce885413ee0c937d5a81e45d5630f972c09ef7747805fa13963a9d546f5e95fa86268f3f4d47dba81f2db2888dc750b788162c24693247754ce459bf8ce91eb1c2be578000f65c7d08bba4f86060fe46db1c6360394fe1eb8a68857fe22cb488c85a81d4ecc2cf642347a7254e63cd065d7eee15d70c9d05f306a2bc0a0efa4551aefdd31d193fcc", 0xa8, 0xfffe}, {&(0x7f0000000200)="bf4a7737e543612c655555fca56b74a9adc048a43082ad812d", 0x19, 0x20}, {&(0x7f0000000280)="217b7152b4475bd4b380327d64cd03250d7e1338bb2e9b20dfeb8d2654b9647d942057a7355b2d20ceacf57bfd7937e29c3d29a8515d19d6ed01ac6ede1c641fdea9d3042d9b7c4de6202173d58cc539aba996ac8dd0cdc13d69e6c741bd9141ace7873c7878e529ae86e2f7de2efb5e9f0a71aa5aedbc8c45007efa6e", 0x7d, 0xffffffffffff0001}, {&(0x7f0000001580)="de623e3d9c0ad5d41dc075f49685ea23e11153f66a9aa338d7a052c3af7078d4f306d25d13d93b473b5dde879192ac57c58ee3e890f60fe41b8e4b8414dfc563268e61e9f7d7f108d3f6316024fd0cdc8cec29db3b9d83c96345b478f21fa3094b7d", 0x62, 0x6}, {&(0x7f0000000380)="45798f970cd14dc19386567f7df42d9f1d2b718ace747bf1a80ad6f849b77995edab4ce7c19f6f", 0x27}, {&(0x7f00000003c0)="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", 0x1000, 0xb029}], 0x0, 0x0) 20:11:59 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:11:59 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x200, 0x201) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e23, 0x9, @loopback, 0x9}}, 0x0, 0x6, 0x0, "f71f32d4bed15b9d5eb79525b278ef572d20c0e117ece6b2aea742595320acbf74370ae8d6aaa2701bffd8b2f94eeace3b641a0c5d996c16cd8d6072aa4e7bc3885a94bf05107f62c78b0a54cff5b85d"}, 0xd8) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) [ 1958.358965][T11116] XFS (loop2): bad version [ 1958.363656][T11116] XFS (loop2): SB validate failed with error -22. 20:12:00 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x4000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) 20:12:00 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r0, 0x5a, 0xec}, &(0x7f0000000240)={'enc=', 'pkcs1', ' hash=', {'sha1-avx2\x00'}}, &(0x7f0000000340)="cf58c3f899559bf8747db0a84d0d6638e0b0e91c1f487fd50a78ca27fd39cce8c38f20c8cbe5c9aa480b3c0d9ca96bdcd2ed961449d1bb204d2d2c027bafef8d04f2d8d14e605c34d15d1b0a9b49cd968845b7422bb8e41127ed", &(0x7f00000003c0)="1a81a9c5581bd8bdc5392f9fcdfb7607b432895cf8d3b8779ae7e48222452bace649d082a350afb313351c5bc9858b666517ea3cbff61e96f72502b331c91648941ff340899f092c2d063c3dc24c2aa21105dc58557c255a0922a4122a9c4134b31ff1d431cbfaed983b2328b37abbcf97883badd05f3e32840c52a028c694541c224ca2af55655ec69169cb226f120128a11998147b2a71a3f48a87047a135f9e9f0ce5f7244b95b0844975e3889b47ff0fc6aee94e37ec9bf5329c75a40e95423b7b8c6e359deb8a9760281bfe4591cc0607b6193d3ecc54fc53f87a5e7f142e23b031c7f740692b02ce3a") 20:12:00 executing program 4: r0 = epoll_create1(0x0) close(r0) socket$rxrpc(0x21, 0x2, 0xa) accept(r0, 0x0, 0x0) 20:12:00 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7f, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000200)="b6bd5b09bdc550719d0ea60966b8f7347756600fec2a3b21ba01148bea213e2fa42502cd8f298fe8580b65466a0d6f1bbf9f46689651e92989ba3795384a69e876080d4c98a1abf3ffe458e0f56266b8c0033dd71696946a1b02850d7b971d93f2fec994942c4182cebd9c51c657507e77c9a13731207084f3085fbfd0e42e5fae8c734ef60a740af2c4165cb71c4412c74022e8833185fa2ed818e64ddea7b03a88", 0xa2, 0x7}, {&(0x7f00000002c0)="6794883642c4ce57d6ab191c24475565047afb67ddeaf16796efd7fa809dee97657694eb301ed35bfe1ee74177bd956306e9fd0c5d42a77f4f3f73fbb308d69956b3b502ecdfb5916d8da068b42cbb7f027310365f571482b5c45d5bd150406b89a4515fd34af39fef8944cd4de5183c83d8515172f505d120c13de2d9c1506a8bbc34d9184d40aa53158fd282016136b8689a18c7", 0x95, 0x3}, {&(0x7f0000000380)="db092b54419f49bc25bcb8d59189b711f0bd84b1c51e877fc25ddcc07436c7330f6a4ce2b5e9698f9ddc483fd9489917377cf136e1f2b9ad8fdddbe5dce18b73f1168e1aea2d627302ad44a843ab678f7faa7e361fcb52997a696eb5d845fe40d8adab5538fbbdf8787ae9e4eda7877eb9ae8a862da3b8b1e9bd7f9def5fe7c7ec838688ea11cc9c90a47e4583b93b7aaad6034c5ef7e0600e9f30d584a0387f55f3e70706fb738510d856071dee4c59f2d7546b49dafc2be5757afd907c544e510363a71af8a6acac0365a9c5f03feac906ee2cf621057a7bd290846cf690fae68b24e591802c49ccd074190044726e", 0xf0, 0x7da50ba5}, {&(0x7f0000000480)="11f0ec71f89567ae394e7a4a4284fcd0d8dd838d4414274a51d097fac888c87276319b477c61615a9257ce854077f7d533218422f26e31244ef641d48bcecc806e41a6d8c2a620d4fd9b285dc71dab9d7a2b4577dc5d1ba049527f66addcea244db69043093a73aa638e00c0b4ff322971f3af", 0x73, 0xc3}, {&(0x7f0000000500)="54160b6ce8ae823bb4c03b7c48237f690f016834483e2690073771778ee8a9e1b0cbf0530ab8d2b046efb4c9c762baaefca4216671f76c2369055021c020ed48512dc112df9dc7762fea8b6dbc00d2103eefb4cd51a8aa987996a6696821165f83969d6bfc999cebc087b79e53a28b0c35984e2e8ea2", 0x76, 0x2}, {&(0x7f0000000580)="ce8e8c8a8c744fc459733f25777f6a586d4b90774eb521e19e9055262551e6b1ac5eb1aa99987f859c3a", 0x2a, 0x9}, {&(0x7f00000005c0)="22f6ce137c6862ff756895627a9ede6aa820f7357cc9f5f55e66fcb3be9bb00a2b1aecd80f77d483d0795ac407578c65364025ef9763a6e7093553e6896fe1e89b3c8b6995c0b5d66da133c6be256f82167f8312dcf39da7bae26cff22257e9744d413315f4a453147997330b2715e3bdd2cf9eddc4d1129ca9a821ec68c61bb4a1ce35e0f9997b520612ff06eebe892b553296613d73fb6f6adfb16b1a559bbdde6c1cc16a6008625462fdd74129b5fb883f9fb6e51bcb0907185fd1c2e5379eeb3f02815e2eeb6d41795968b04fd4b83eb1ad4c923b22edbd38efba084f52542149d62e37b6db2a5cd31fdccebb432697776ecc9", 0xf5, 0x9}], 0x240000, &(0x7f0000000780)={[{@gqnoenforce='gqnoenforce'}, {@dax='dax'}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@subj_user={'subj_user', 0x3d, '&%eth1)\x97+(keyringsecurity$[self@[vmnet0'}}]}) [ 1958.808854][ T26] audit: type=1800 audit(1563999120.512:373): pid=11230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16946 res=0 20:12:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x6, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) 20:12:00 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xaaaae71, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) 20:12:00 executing program 4: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800000, 0x0) pivot_root(0x0, &(0x7f0000000280)='./bus\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020001) [ 1959.456417][ T12] XFS (loop2): bad version [ 1959.464526][T11353] XFS (loop2): SB validate failed with error -22. 20:12:01 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x400000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:01 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) 20:12:01 executing program 5: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000001340)=""/4096) connect$packet(r0, &(0x7f00000000c0)={0x11, 0xfe, r1, 0x1, 0x80000000, 0x6, @remote}, 0x14) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000000)={0x7, 0x6f, 0x1}) 20:12:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0xae41, &(0x7f0000000100)) 20:12:01 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, 0x0) [ 1959.858331][ T26] audit: type=1800 audit(1563999121.562:374): pid=11469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17120 res=0 20:12:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x7, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000040), 0x10, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) sendto$ax25(r0, &(0x7f00000001c0)="6a88eb8742a8662ab91a5b5bf66c754d93f11a1808d6a1fa19fcdbe1619bad5f03d72414022f35c0cf31a327919829cc0fb02ebeea217f61186eef3d798d4490380de67dce0de9cf9e2ebef7161bee5fa923ed04b85b125da1460c7b09d2e2a00d05d0626fb27741bc3e0b67b9b34c7d33ffbc255ffe8c7344dc047288c7601039d47b47d957a8b25786515c6563ce48ea911444c6bd94e108313f828bf48d800da0f87a1ead608e8f3833bdc92def5bc90a539068d67b2f4f2c2d85d2", 0xbd, 0x0, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) ioctl$RTC_WIE_OFF(r0, 0x7010) 20:12:01 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, 0x0) 20:12:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)) [ 1960.424401][T11589] XFS (loop2): bad version [ 1960.429136][T11589] XFS (loop2): SB validate failed with error -22. 20:12:02 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x1000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:02 executing program 5: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) 20:12:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x800000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd"], 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, 0x0) 20:12:02 executing program 4: 20:12:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:02 executing program 1: [ 1960.943674][ T26] audit: type=1800 audit(1563999122.642:375): pid=11727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17201 res=0 20:12:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xa, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0)="dc08b2b0f8f73238640022a8001d04fee482607efb1f94c95004d671d2888363dd8521940bab8a117bec3f50f445f9b282508bb2d6bd457858abcc3f0f150912a0e6bce7a1b137662197facaffe1531a4291979bd809d3d2dd635d53184cc736090e166c40989515896a1210e2f4d4f4d2bf474626742540889099c5bc8bdf5451495bb3d0d56fbe5b4d19dcdee3023c9a818952a7ccc210ac45495be65f52633f634ef832241db014801c619317261529a26b39a55c", 0xb6, 0x200}, {&(0x7f0000000280)="40b9299783017460747e61b68859130e7febc93bcfe4bf3aa646af3138855e7f7529dd6a059e4f8d39e803164fb3c6fc995759f70c1981c40bea0520b16c909ed48d0c590b837672de3d93e4c7a74ada7bd678c919cbff41928bcab81b2990594039ffa2b2c3d4fd", 0x68, 0x1}, {&(0x7f0000000340), 0x0, 0x8ea}, {&(0x7f0000000380)="99677382f85b6fb3cdddac821f4b0bd86a73c3d516b00f230e7bc81e834e113b3d46abfdfa34a1234ce6b9283401d5e2830c21487498aedfa5f84b90f98429ce236fe8e11ecbc4722290b65e6115d4cf6476955120cfe9819a5dc46586b3757dc32bb0898e5525be7aa5e94305f34af610686ba85973d3973f44d6d6bf923456848fc8f5b93bc97e9c7bffd09c74a4b5a17c2e044e4b717171f9ac22788ff56e1477dbd536b9a29db71f8605fcd41a03b09a409a0f018ecea256623c852af4f195dec78a951721131887f51343233aa1c3e218677422f24e156f67d6cf39e5f4b3a3f5fe07a4d8548eac33ecafd67476db70e6c33f", 0xf5, 0x1f}], 0x200808, &(0x7f0000000680)={[{@fat=@errors_continue='errors=continue'}, {@dots='dots'}], [{@euid_eq={'euid', 0x3d, r0}}, {@subj_user={'subj_user', 0x3d, 'xfs\x00'}}, {@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}, {@euid_gt={'euid>', r1}}, {@appraise='appraise'}]}) 20:12:02 executing program 4: 20:12:02 executing program 1: 20:12:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) [ 1961.376288][T11744] XFS (loop2): bad version [ 1961.380818][T11744] XFS (loop2): SB validate failed with error -22. 20:12:03 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x3000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:03 executing program 5: r0 = shmget(0x3, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) 20:12:03 executing program 4: 20:12:03 executing program 1: 20:12:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:03 executing program 4: 20:12:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) [ 1961.927046][ T26] audit: type=1800 audit(1563999123.632:376): pid=11780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16565 res=0 20:12:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xb, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x398, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000380)={0x10000, 0x5, 0x4, 0x10800, {r1, r2/1000+30000}, {0x4, 0x1, 0x3, 0x4, 0x1, 0x1, "73d0f8dc"}, 0x200, 0x3, @planes=&(0x7f0000000340)={0xfffffffffffffff8, 0x1, @fd=r0, 0x3}, 0x4}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000280)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x100, 0x80002) renameat2(r3, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000200)='./file0\x00', 0x0) 20:12:03 executing program 1: 20:12:03 executing program 4: 20:12:03 executing program 4: [ 1962.427481][T11800] XFS (loop2): bad version [ 1962.455584][T11800] XFS (loop2): SB validate failed with error -22. 20:12:04 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x8000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:04 executing program 1: 20:12:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:04 executing program 4: 20:12:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x800, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) mq_open(&(0x7f00000002c0)='xfs\x00', 0x40, 0x14, &(0x7f0000000300)={0x1, 0x1, 0x4, 0x7, 0x4e, 0x2, 0x1ff, 0x3}) accept$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @local}, &(0x7f0000000280)=0x1c) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000340)=0x4000, 0x4) 20:12:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) 20:12:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) [ 1963.036651][ T26] audit: type=1800 audit(1563999124.742:377): pid=11833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16611 res=0 20:12:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:04 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x143041, 0x0) inotify_rm_watch(r0, 0x0) 20:12:04 executing program 5: mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x40000, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x76d}}, {@common=@noextend='noextend'}], [{@obj_user={'obj_user', 0x3d, 'vboxnet1'}}, {@dont_measure='dont_measure'}, {@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'xfs\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'xfs\x00'}}]}}) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) r1 = syz_open_dev$audion(&(0x7f0000001c40)='/dev/audio#\x00', 0x350a, 0x402) write$P9_RREADLINK(r1, &(0x7f0000001c80)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0)=0x0, &(0x7f0000001b00)) mount$9p_rdma(&(0x7f0000001880)='127.0.0.1\x00', &(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)='9p\x00', 0x30, &(0x7f0000001b40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@dfltuid={'dfltuid', 0x3d, r0}}, {@sq={'sq', 0x3d, 0x3}}, {@common=@msize={'msize', 0x3d, 0x6}}], [{@uid_gt={'uid>', r2}}, {@permit_directio='permit_directio'}, {@subj_role={'subj_role', 0x3d, '}{vmnet1\\'}}, {@pcr={'pcr', 0x3d, 0x38}}, {@smackfshat={'smackfshat', 0x3d, 'loccookie'}}]}}) stat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f00000002c0)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x3, 0x4, &(0x7f0000001680)=[{&(0x7f0000000380)="f8a41208c70e2795f95f983ba7f9976b3ac8c6b4545d0f13c2d41fba06c11b6a4ed4a523cf6af8419ec2db303f6308b5b3dbe3a4cf77ecc5ed2d5566a7b86db08d28b4ac61b5dbb47fec254dcb2e41998419493a78bf73f20ae9bc5883a79b01ac862d5f597385d4651bbe12a3a5c8b2fd1fe898e28acd35cd238327b7ba2870dffa9798b96046e6c6a43e928015ea73a35e90b856b6100ade75b119ada5556982f4e4ede82febb6b13fcd1ccdd5e0bb627ab230f08b7e3b9f35b6cd6bd5f01791ad69b5bd813d8d49a3a4b2708729173065156048232e313dde2eed869ed6f5f4c3026f805fcac7450c4a587ff28d9c03169265e34af1490578ce721b22c57e46478322cad050e8440f63ec39977043a99efbc31f3663cf53bbf539e59187c70677ac88d99920c440080f61a696f0bb2d08a152a0c752459259f12feaf89bfef1d21c55d2a136d18c36264a8ea21ad27ebf190241c258b5bdf29e65a86dea6ee43a9c0ad5e8cca69496eb30287c84fead243320c8a4a33339bb85eb60b6baec761be964b08d744aeff4302d93d978aece291fc84878ed9d2d4ce4d7bcf787eb35e8c30d070e1e36e41d91e591bc03c7277b778839d7a052d1cee46b40a77e71f8c7708d27b1e2c64edf2a31e5a748308417f6c8de45c7b88364734436773e1a39b285275662c8a8614a0c13a6be35a141183233d159874abfe6495124d368dc8d0846082d9873eba0e4388a63002ecc3a9650bd978cf30d32798b1a1d553b70927e8fe26dbacf879a80646ef85c3f881b336befab14b2b2dde4e29bc461109ff64e87d485d035b6560fc5a812f8d79370d3dba1ccf4bdebc6bcebc899286f127690c8e11168575214562d465f3fd82437abeff168e4fb8e7bb350f1f143e6d2d25248028bc1e641f614ecc54e696b6ec859bfb9db9d536177455bd8e5008a06d683d5817e232c6d8a5299af05fe900c047f233ccc7b012820a075158c2dbdaf4e55dad0fbbfac056d8fe0881109597b90e15f5218f5e6b0e9d207e2eb0d18282a1cafaf28242b8e5dc2f6f35a21ebe279ca6bdbdd666ca61d1263bab9fc28b89625061a63bd10398a8d031626058ecb563f383793acd3122156b1a35f5417c079a34b0d3fd51a3cb1d72cfba1476d6bd6a8dfd7059cec0c65c86eeb0dce51344b1da2ec4e75dcf8be283d618d52fe13b688b36b1e77193b2f2581e1cbd8771edbf3f5a5711ddd02fb2aa924600a6c19b07253e8187438aa0d0a8f13d8e607df9ce433c98a89a83c978a15f788e2fe14db74a4e8cadd06789ae744d6beea675c40e5ae925a126edf989e8fe97a00d208c5f0851743d7d9e96028b8411cf06d7546a18af924992195bf0bd09d91112b6ad48175a3759ef2e5c1f37b413ecbf5cf967a4510e08c3fd6a519009abb64bce7514ae4f82816c259da419ab3ebe10c21cb3cd773eafc9c50c4aef8f576bcc34f330dad40f2030fe1076ff944bda4768792c7cd60e8767222f24b87964aa8849bd76f6c2a53068d9ea1241b6273e062a61e5bcf3539cd454d5772dc14aa4270924c7e517446d6c09bdf08796135f62e8c1bfc91e1039262ba1f67afe5e1f9a4b2b42bb08c32652a107b8644c77a9c7bfe974054c1a2e7fcd22b7278886f176e221207d3dedd3d3b86207a26d9599881f56262492ab900935d87609057cf957ed82f1c867b8718fd359c83672912ea1349988ed197809b29ee408e6f1881f515a5203593f3dd20289d490ffcc2e178e4febd1c8400645bdfe9faadb9c9aaa939be29553320ad33eeb61b00f1e59b456a936a27cc621c54844cac73f1a0b27cee11a1ee79a4eeeb25bcf03ac38522346b11a50edea8ff9f097d71e7f70a4d171f0768f219e555ce265bf5f92d73a463d0afb7871e944f7f95eb60971876845ec2db718937ad9ba6746260ba2c9510d2fa07b75399b431560f4a29e21f9f67c4c185cc5433258dd7a48410d10a0f3af9b91d560039f0614ca2dbe7a781e50ee80851a77617595e8ef4619a995d8657c14cba40b5f42254b936faae5ddbb32b57ac377e16cd68a1d33bc38209425b3047b359cb25c1f898641af95f45a8c7337e03c4bbec76ea0bb84637f8d0a247fe89d4b18954fe1e7c865dbf285e0784a4e08cbf7261054ede6bd47ad03f8477b411067aa3d8e88e321c128655aaea6ce66e4d3083f03f103af53ee57564b50e901ff234b32ce79d3d0f81e4c7c1d855964e9e40931bb15346f284ca71ec2835d643e7b681ad03fa7294a4cb74f593e9d7614a22fa9c7f46ab11d86f2cfb4b0458917f8d1848fc21aa38f6391158afa351d4222e1465938cb8413717b92227dd44de4b544c99b41c9bfff997d0976755b7be94918dc32a8df7efea4300020af4c5718f26ac76ac5127a3dc4bd476ae08c8c8539939912a3af81555150228bf11aa59e3c8340ff7d0fa048d5b2a32ef2454d4f968857cb1f35dc374967fa40c2263ae7d9b0410ae19d1088a71a97158125f6dace7b95d32dc5bb80d7d394e38601d26d5ee21bb8cbf4e72c85bdb6097530d32ea369629536fa73052af0abcd4fc56f9b7e6bf5587bfab63e37e73e47c3703a5c4126a461fc5be65accaf4c484b9cd7a4c5c5c171b16af25db7f782ab6d3df1002110bb5ceb12d614bbfcc66db2e2f42f4b54ac6ff9c9b2f5e84e31e9bfd8046a2217c92eceb0dcff4e773d5ddd2d7bde6c73cf30d932bc1bea9ffb12c74f464e6b347667f0aeac15bef90fd0a0cb9886e4c18ab58790c8cda4bdb19798e53884d00b0e32447f79c063c06000cbfdbc3cf0becd2465c9008607ef822c727d66cdeb01c683485a79f899d2c3541291d0ef25068be6d1340009f5c3e01891b0a6c0024121b6a0ca8c669250b07f7b0d3ab28ec9dad7f879591b3bcdb150263b8c95d5304ef232e928a354b651dbcc79ac08bb55b5822ecd4c229b2f4b283087b5abd73d2353f9378f19adc4f162c7bc0d8564e6769649c4c1b24d429fc4929995a3abfbe6265f98283a0acbefca26ae4e68aa5e9f44300cd40e7a16ab6d2c29c7d7277a58ad73991da14d3e9992c2b1d737b564d642f29fa8eb4bca94c2b742076fd79e2ee475485af8c2f9628e602b8db1a67614a60f19f8e8dd0e524e7e26d04ab68e998f2038be5fc0746261dd120d3156648ad05ce7feed51894b6a45d93fdf2e3707f5ffe9dc81f1aa01fff0c0621c12b49d184cf85a1365935948bf8e8b29f7f13924c64032a439f5e48f64f8c9993ac9bbe6d91b084113d9cb90fc0782644627ec7e8789ceaa7b6e49b26acbd9c919263fcbf1e321fe6607d5542109b942810320d4c7faf4958a95601d4e7b7f9f5c184814f119b0363444ea7288be96cbf10ab9945c05559995e23615c664f6f495c7a4a21b46c4adf7b0d554faf9dcf1d21cf3d63eb3120eff25d3eb328bb546332cd2d4a829c755988b766d030d1e186e69c6c29ed8fa759a9812d05f8ee6dd25a90fe05f67a612f045a4cfbc612baed261d2ffb8d52ea4e5936c152162461b9f62fe8348e33e96ae026e2249e17c2f492f83598139e74d548ed72887c1a79c52ed77e128ac05c721ecbcd94f370ecd50891c9db6e91e091c65740a1458157ffb82b6b0c59f1dd761fb8d8d749d7d9994390bf06652eb7c0183ea878ea8447323034c4237880fd699fd8acc2fc199c4caefa978167bdbbbc1396be7f5f1e8ee591cf9f218c7f4fa597aae01cdf54b71e07ddee8df7d705296f4b4557fb3611595cbd2a21db520815747325c51530adc24d4b9e78b33ea1954599c91cea702884787af12a37ad5bd2e4a4e1472e8278c836670dc0c2743751a89ee3e19108272fed4f01097608b37c83a5ca569f53292c90bcf6f887791a0eed01fdb7e0ad9d60d61a6130c8cd3a8cb8100883ef9497d95f800621c66848bc5379520d4111931941f6275f93a152317e9418e6a9f218f2a81d1ed2983a4d8c0846b2cf4ccf8b533752f2ba7afd1fb076eb3e220f492cc0e8501d6f983eede5bd45d6a9f71ced3fe2f1968e865303cf55cee3060ce8762ba2b094c3c1419f1709bed7b8c81edac7967f7f670709f415f2a721b76812be0df8241b0424b7c3ee04e0a02fa978e763b9c64b803e7be943c5285b06cf227b73d724a6a2bec5f9bef9109ad283b1c23f254a0bbdabd32501139adbdab87f9939b786c671da81050429e578c8fe28783a4cb8b61e5cc6d87b9f50c66fcbfdc738da8795c15ecfa211a0e50131a50e9c85a7dbdeab64d159951b4350ad55afcabf30147e4c61e9bd2ce9f7c3313e44f8c9a78cca89bd3bc1d074ba4a83df239779b5ad2015ee3bfbfbb3ac9a11d417c57283a722154cfa6952e7554178e207bdb171664d800d654b78e7383d5547710323f0d085aca281a9ce0b9f6a74c1ba107f371789a92cfa284cbcc7575f2185aea50220c21e831db3bee2d652cb29b4f4e2595f5beef9e89abb6c32496638bf117638643075f5012de2a7dcb7e90682122bf479ccb0aef53c01826ea1468b1754aca89c481e23bb2f9897a6d397eb1ffd703abdcc737a67903897d1193af846642a0857a752f129269dae0901571cb54680183b46adf661ef47c7e5a8c2a6dc5724f605a8701366e51685c5ab166152d1ead1465392ea06679e2ee45f3b1e7d344339223fb6f9bcbba1d1ca3ef2b4b70c2e31b44d8cfef58c6a6f589cdb8b075284c9b7b7961ea2b87ea17e023a64fe43562f7a9faa8f66085753e40d2225806894cbd296164e48f10488f0bb2de9de4a62a3f6f14c14ea3efd485eadab8554d352765f771d4b7f2ca7e1d5ad0152397856c321f25b58d0aabc0594a69f9bb4082b344b1ad6eb189811a6ab5458b06580f9c656d3c9b3e3e7eb287d85af06f4c2f41c8a075203b2c491d06574ae2e0242f65c3c5f0960c3d238576f5e9bb5c5e794f0b924d37c6e7c82e0b989824db6545c4f245bcb09b5182a7d4f39abd00418ff4663bb8429dfa4b47022eb78e421502f499ca867360c25df271f972ec82392f734dd03fe650f077b3809be18bab7b7ebc9ff931937ffc1e5874a933c1a2cf259e7e8d3a953d7712cba36c867d9533f2d0b5e781566c0b45864a3afa8490184eb310e25047be8fc239aa39162d1f04098a84a1ef8ff0b75dbfb4c21fa71e1a8f2ef6d80af87d6bbb3b792e18cce1cce890096756558467bdf537be6821818acfcfde6363f55c2229111470d89a75865799281cc283b37907f49e3009bc9b38970ca4c03754a5cb1f38a92f1466a1773fa0ca633344d2cfe815827c59534dca844171f5be2271381b50faa3a8750aaa741f34ca71dbb1729e8b42920c1415e2c8dc1809950cd3797bf0635383f2de22f0d7913136a7a65e127231268778f38cef9cb91bbcb2365a5bd85fab6824ec694ccb400507e65f5479f4c5244b75f1ee2c042715285435d9c70ee89a2aff260ad0a942d96c90b421e381162f86e4430773533b4ce8b7c4bd7391d0fba11fb1aeb553185a00f0ae3862a07f9dfafe0053379bae80017b5bbad46a53a3ed6b27e10d9a73dfa7fa514412b0c536e6c9321a19741b72d940810c51c5d56b64b805c6fdc779d90c5a55d1975751f69330a0fec314c29981a702d3b19700511ea7a14162c66bb9817608959f951383e779b3e69ea5a83c37fb37ad3df56052818cfad336b660a7bb4b3d1d08649b649d63c59d6dc8d0d2293365428cf930982d127c158f3e394494d33b522c03d8ce43f34f0d74b978166161c3ff6b18c97c09779d12f2a362b9a1b8ef59dfd2ce4966c47355a8486", 0x1000, 0x100000001}, {&(0x7f0000001380)="d4916eb37b31e49e3d5b3a5b8719bf273472b30b60f46d50b1bfa9b0f78f5bfddadd909560c1d1db1b0498a12bfe59b43d82348d121f323583051e125ebf34c612996797f1fc794e01371676a0349038765902a4d8f7c17ae74d561640fb62d4bb47c0d24facf5b9cc9355bd6829bf0dfeff4d0448a0ea9ca20cada181b31906813a234aa8957b6a219725e6083666910083cc2206069ae76b20ee1c3c118c33c40d9469c86980d0e91cc52e59265b3d8741307ba931519c49d076d662e1cd5740f02fa1d3695e59355ecac6d472b394a44b84b032", 0xd5, 0x6}, {&(0x7f0000001480)="a8ac532fd34f56a8ebe3f2cbb5b3421ac04ed8522df4742116474a910ec12f10abada7666ce617ef764dd02df78fe416ca2c517a9716f09b403cb17eee0b93d21b8d4ef8676255e318d90781ba2c248ad71aa1c4746a165e8e2c528ca73e693d5fb1f80f378b48c95ac72083b3e9fb66b2ab11787d71b84957346ecbd44594b3e68fbd32e869b9b0ae6c245844f290754f525e5a42ff7838088261c34548df2cf78639791ef919385a79258aacacf034cc89adf8b6624056c4637e7b82d753d32cae70a567b201dcfcad43956610342f474865faa0582f35000920ae64f22d8b4ab77c1189", 0xe5, 0x6}, {&(0x7f0000001580)="61ef2e904bd700368b4a001cd31f92f673a68b05e04478c57e1f609bdd99dfd8fe6a1d04dffae592a66e8dbf924667b64b692e16fa1754016afca2a78d7c51c546c192ff96f463f03da840edcb035bf3c02ee40ce65e35d44bbfd8498e24d1facc22c0b593581a33379c532c2eb05a6e98d76b1b3b64b2625bee3b4589c457eda83534073a8b958e7c7fc1a24ee0a1f44fa0cb728e0b81e60aeb24337b3cd2ab270fa01ccca5b7f2a59c741aa41cbdd617eda38704aa4f3938d394d8f9da5e7cc7ddea0a2b503b76fb53872b588cafa990cbbf4ff3004fbf921df931533eb180b399", 0xe2, 0x8000}], 0x10, &(0x7f0000001cc0)=ANY=[@ANYBLOB="646973636172642c646174613d77726974656261636b2c6c6f63636f6f6b69652c686f7374646170613d73797374656d275c6b657972696e67707070312c646f6e745f61707072616973652c736d61636b6673726f6f743d7d2c666f776e65723cc4a34e3123044b6705bb311b49bb24607202441ce1f3780f62938b3171fa0579cd314a675166c10a86c5484c3483c5f0cf50b81b0546f9166d1e733175c78a046020bb983400", @ANYRESDEC=r3, @ANYBLOB=',dont_appraise,\x00']) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f00000017c0)) 20:12:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x6c00) [ 1963.532504][ T12] XFS (loop2): bad version [ 1963.546059][T11923] XFS (loop2): SB validate failed with error -22. 20:12:05 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x103100, 0x100) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = getuid() syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f00000001c0)='./file1\x00', 0x5, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="c17a8bc54de3cce19bd7eee2881e34e920d037dd90d5fcf75f71fa806b4ea34ba80945ab7be76447792e5b104dd68478d6c77950f1ec44bf1521dbf8779dcede999c2741d7ddd418d22faab6803a3b4c12cec668409df4d5b4d1d9d4431589412888e478707514c44ed5bba726ad3c4e1a354f6d58b4de5408c9b3de93bbe75c380f3bf03856d451b3dcf1c4e76ac1946d5f025efec07d7ceb83b9567de28e386d3295666419da", 0xa7, 0x2}, {&(0x7f0000000340)="2103d02e5ac1fb362017c33c33b493920e5ec081e51f2b11f657657f36fc5667f40f105e35dd2d375e88b1f0b1dde35898bdb07ea6d9d473772994eaa98123fcfd3d10f0a382a34877bf9ba92f2e4d51cf22350234f39650ec043577b5f2c67c122b19af8a1c749149aa640c85848a3b6dbe9dae69c472cc1cd370a7bc3ce70dc62396a1f7cc05915392f11868336676ea9bc9a9d811d82e41999b58bc52444f7ce77a3059bf36b84120bcb49cf5cad76498dd635abb20c037e7afd4a149de", 0xbf, 0x8}], 0x1000000, &(0x7f0000000400)={[{@dax='dax'}], [{@euid_gt={'euid>', r0}}]}) socket$isdn_base(0x22, 0x3, 0x0) 20:12:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:05 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x8, 0xfffffffffffffff6) fcntl$getown(r0, 0x9) 20:12:05 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x9000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:05 executing program 1: r0 = fsopen(&(0x7f0000000180)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000100)='nolazytime\x02', 0x0, 0x0) 20:12:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) [ 1963.965756][ T26] audit: type=1800 audit(1563999125.672:378): pid=12001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16594 res=0 20:12:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x14, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x3f) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'bridge0\x00', {0x2, 0x4e20, @multicast1}}) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffff, 0xaaaaacc, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039b0497f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3cffe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2, 0x100000000}], 0x40000, 0x0) 20:12:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0b") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) 20:12:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffff, 0x4080) [ 1964.409074][T12107] XFS (loop2): bad version [ 1964.417521][T12107] XFS (loop2): SB validate failed with error -22. 20:12:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0b") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:06 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) 20:12:06 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffc, 0xd1, &(0x7f0000001740)=[{&(0x7f0000000340)="288fd57eb47908119bf1e47afcf2d30af1ce149aa80cba61f4e7d80dc5bfab160da974f317e7a8788039f822b2f73d6205f5a6a3039addf8aa962513fec085691541ea911db89659aa540d9882fb8c9e62627ad34619d4ca0de1b0d66baea580d98c022cde81deb60f581061ffff29dae829bf5ea4050bf6fddff09b38239b9ef359d455e97354d46fbcc256452e37d2de9d5dec36d2834d16b3b6988e1585f4ca40c3871af2e4588f451e20bff416849f6cea573e37e933bb2baabca0dd4d647302e827cca4275a0f38b8", 0xcb, 0x800}, {&(0x7f00000002c0)="e793f1fd64a97583a76dc642", 0xc, 0x8000}, {&(0x7f0000000440)="70f85a70ad5509108b4e2c910aa4ef1ea7f72c4e35f33eca14bb04d8363497f126a1e377541bb772016448f5de0df2ba1c15e0783903c3ae73715d1167a8639022342adce8f5ae4a013fc5e01c1c1f2e720075", 0x53, 0x6def}, {&(0x7f00000004c0)="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", 0xfe, 0x8}, {&(0x7f00000005c0)="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", 0x1000, 0xda8}, {&(0x7f00000015c0)="f6f89e6a30b8df23c172d818a5c2d28cb98e7e85bd3c28af6ae727748ff475039904f69a1aca4e692a1925ee27f37929b2a4c5e7601dc888fd4fa53d3a39965019e1d7a341b009f437f3f68f8187c590770f4e9987a7a0429e249a76f592e89d2e5715404a8305bd4db8d8594b23315fbee2cda2571a1640e718", 0x7a, 0x676}, {&(0x7f0000001640)="9b3488551fe001b3192a86b83d21f50d94817b18b2d4a2a577d0b0fe324ad84901b2e862aa932dad4ec9e6c1c0623535a7b126b7b38af129", 0x38, 0x1b7e00000000000}, {&(0x7f0000001680)="d57a0f7b4bbd3d0b05201bd41e9eeab444ab41046fa66a163cdc0d055790a752cd01e59afb581616503cc01cdfc16c6e4fccfe2422398e94d2e5854af5e99c7e38e4bd1e188fe2d49750e5373c27f9debfd895c51a90d189e56f04a3924ddd6ad9a113b05131a7b53bec555cb6f9f1d45a4a1910d77aef80f13f29d05e2a62f33580713b7afbb0c93e013cdb2cb3bcabd37abe484f742ae731298ace7b6826950ecb264b009858", 0xa7, 0x1}], 0x1100818, 0x0) getpeername(r0, &(0x7f0000000200)=@nfc_llcp, &(0x7f0000000280)=0x80) 20:12:06 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x10000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffff, 0x4080) 20:12:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0b") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:06 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) [ 1965.094626][ T26] audit: type=1800 audit(1563999126.802:379): pid=12160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16881 res=0 20:12:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x2e, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2980ef44d9a8b9c7, 0x0) r1 = getpid() r2 = geteuid() getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) r4 = userfaultfd(0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x8100, 0x0) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700)=0x6e, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000500)=[{&(0x7f00000000c0)="391c83ef34a6950c1be9b573f33df0ee9fbf0a532d2e5dbf1d01995b8b83e46e268ac49bab15aa", 0x27}, {&(0x7f0000000240)="90eefe14ac6e675c481b50bfc4db1601317fa213e3a92155b96150bdc06dba07711adf6d343197e577fb8865eda2541aed29bd1a157d", 0x36}, {&(0x7f0000000280)="2450c098f9d18a16b235c8ee610d1a9e0178f0296cec9e1b74ca91c4ad20363f35e4516957ccd253c7ee570e6e28e3865e117ca328093a5140a77d101484e0fa6f8b92094e93a07841e08db2518e81c94f", 0x51}, {&(0x7f0000000340)="de2637e8f4f2a868a932f5ba50742f83ec20811adc2eb966b7e6c7f62ad30dbd825b1bc004325d4f77016d971e8ac8e9e654e4e3b7f194ead9cf82d8cf0aa37f55c47e0a2875ba5d7503054e41452a2bfd3f02c6c7780a9b3aafe1bcc58d59400c01aed153a24a52313822c4c8a0e507b60a4033f8196d5087c540a00582c48551c69c94e0ed4113e5099be49d3a31c178f44187eabdc409f03da3d0d213256066e58bb7704c2a457e3349cdd9a61c939bf01d01afea1f504b253df808d8dab2c1d725c9ff680f9833d1ba33b2a84d6b38e8385c587fcfb1df823fd529e928fcab5b3c79bedd2b331c747f732db1", 0xee}, {&(0x7f0000000440)="c304926857f8b9d13164a166ddda5f0873b5d906d6b373389b836b65cdb485acfd3fc6cbc98af94ee06e1cb32e340819b13a11ec6513286a5a7814d495adafd032ac4d68b96d4aa5d4b86788f3e51203f62b5ed238e3d313aa2dad3bc23f24f1903f7abaf2b3bb995030b90bed19a5ea468f77f1afa93426092a4ae25a9b25675802462aac7f31f4", 0x88}], 0x5, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @rights={{0x20, 0x1, 0x1, [r4, r5, r6, r7]}}], 0x40, 0x24000040}, 0x4000800) 20:12:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47b") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000100), 0x3) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='\x05/cg\t\x00\x00\x00/sxz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) 20:12:06 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)) 20:12:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47b") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:07 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)) 20:12:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f00000000c0)={0x2, 0x1000, 0x8000, 0x3}) chdir(&(0x7f00000001c0)='./file0/file0\x00') [ 1965.551535][T12208] XFS (loop2): bad version [ 1965.570623][T12208] XFS (loop2): SB validate failed with error -22. [ 1965.737132][T12294] Unknown ioctl -1072667645 [ 1965.772804][T12297] Unknown ioctl -1072667645 20:12:07 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0xfeffffff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000100), 0x3) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='\x05/cg\t\x00\x00\x00/sxz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) 20:12:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47b") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:07 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)) 20:12:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x30, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00') ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x2711, 0x0, &(0x7f0000ffc000/0x4000)=nil}) 20:12:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000100), 0x3) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='\x05/cg\t\x00\x00\x00/sxz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) 20:12:07 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)) [ 1966.137382][ T26] audit: type=1800 audit(1563999127.842:380): pid=12316 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16690 res=0 20:12:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:08 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)) 20:12:08 executing program 4: r0 = fsopen(&(0x7f0000000180)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000100)='nolazytime\x00', 0x2, 0x0) [ 1966.608232][T12340] XFS (loop2): bad version [ 1966.633173][T12340] XFS (loop2): SB validate failed with error -22. 20:12:08 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0xfffffffe}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:08 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fff, 0x2a4482) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='xfs\x00', 0x4) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x0, &(0x7f00000000c0), 0x0, 0x0) 20:12:08 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)) 20:12:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae60, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0xae60, 0x0) [ 1967.117554][ T26] audit: type=1800 audit(1563999128.822:381): pid=12390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17041 res=0 20:12:09 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0xe40) write$P9_RREMOVE(r0, &(0x7f00000001c0)={0x7, 0x7b, 0x1}, 0x7) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) 20:12:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:09 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)) 20:12:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x3b, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:09 executing program 4: 20:12:09 executing program 4: 20:12:09 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)) 20:12:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) [ 1967.685389][T12487] XFS (loop2): bad version [ 1967.690031][T12487] XFS (loop2): SB validate failed with error -22. 20:12:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x1000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:09 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x7}, 0x4) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xaaaaaaaaaaaacf4, &(0x7f0000000040)=[{&(0x7f0000000340)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2, 0x4}], 0x0, 0x0) 20:12:09 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000010000000000003000000003030000ff3f567bffffffff00000000000000000000000000000001ac1414bb00000000000000e6ff000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:12:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 20:12:09 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)) 20:12:09 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)) 20:12:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) [ 1968.145925][ T26] audit: type=1800 audit(1563999129.842:382): pid=12524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17254 res=0 20:12:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x3c, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 20:12:10 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0) close(r0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:12:10 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x785, 0x40000) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x418100) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x309842, 0x0) r6 = memfd_create(&(0x7f00000002c0)='\x00', 0x1) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x0, 0x6, [{r1, 0x0, 0xfffffffffffff000, 0x1004000}, {r2, 0x0, 0x18000, 0xfffffffffffff000}, {r3, 0x0, 0x16000, 0x4000}, {r4, 0x0, 0x8000, 0x3000}, {r5, 0x0, 0x8000}, {r6, 0x0, 0xfffff000, 0xfffffffff0019000}]}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000400), &(0x7f0000000440)=0x4) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa823c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa000008", 0xa2}], 0x0, 0x0) 20:12:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)) [ 1968.892263][T12636] XFS (loop2): bad version [ 1968.916099][T12636] XFS (loop2): SB validate failed with error -22. 20:12:10 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x40000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)) 20:12:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xc6a, 0x1ffffd) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000340)={0x20, 0x40, 0x9, 0xffff, 0x7fff, 0x7}) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x800, 0x800, &(0x7f00000001c0)) connect$nfc_llcp(r0, &(0x7f00000003c0)={0x27, 0x1, 0x1, 0x4, 0x1, 0x6, "1468249de69b688900120b5d9a5a44692362a5dd96d8e1a1f6f97f3037c0b9f7b568beeff1874392e14cbda22786a3654bebed70b063e53e34bb195c7aa0aa", 0x1b}, 0x60) tee(r0, r0, 0x0, 0xe) 20:12:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000100), 0x3) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='\x05/cg\t\x00\x00\x00/sxz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb98b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) 20:12:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 20:12:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 20:12:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) [ 1969.188344][ T26] audit: type=1800 audit(1563999130.892:383): pid=12698 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16578 res=0 20:12:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x70, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:11 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x82280) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xa8}], 0x0, 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x201) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000000)="8a67a0269912bbb6fd27f41de6ff7b37758aedb002550e864eb60777", 0x1c) 20:12:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 20:12:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 20:12:11 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) [ 1969.910652][T12813] XFS (loop2): bad version [ 1969.918929][T12813] XFS (loop2): SB validate failed with error -22. 20:12:11 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x100000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 20:12:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 20:12:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7eabcd32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b3a8a38867b2d08b279b98ffa", 0xb2}], 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x2f, @remote, 0x4e21, 0x1, 'sh\x00', 0x4, 0x0, 0x34}, 0x2c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) write$P9_RGETLOCK(r1, &(0x7f00000001c0)={0x31, 0x37, 0x2, {0x3, 0xfff, 0x7e707577, r2, 0x13, 'cgroupnodev\'%cgroup'}}, 0x31) 20:12:11 executing program 4: timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x9}}, 0x0) 20:12:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x33e, 0x200007ff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x0, 0x0, [0x9c00, 0x0, 0xa8, 0x20000, 0x8400000000000000]}}, 0xfef5) 20:12:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33c38d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6feff831ef6bef0a7e970c32c750774eee26c6b2c3b8fe62b921c5934bda84a4f0d33e10b0c50707becd054a8e5ec3425169a5acdd8e41789393088d2c36352b7a8a38867b2d08b279b98ffadb7fe2a809d731f58facf32cf5e53a", 0xc1}], 0x0, 0x0) [ 1970.183485][ T26] audit: type=1800 audit(1563999131.882:384): pid=12838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17264 res=0 20:12:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x300, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:12 executing program 1: r0 = socket(0x0, 0x3, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab08) 20:12:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 20:12:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x111000, 0x0) 20:12:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='\x05/cg\t\x00\x00\x00/sxz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1970.651456][T12857] block nbd0: NBD_DISCONNECT [ 1970.923396][ T8813] XFS (loop2): bad version [ 1970.928898][T12865] XFS (loop2): SB validate failed with error -22. 20:12:12 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x300000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)}, 0x0) 20:12:12 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 20:12:12 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000080a43ba5d806055b6fdd80b", 0x33fe0}], 0x1}, 0x0) 20:12:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x29c, 0x0}}], 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xffffff6a) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1971.077474][T12987] fuse: Bad value for 'subtype' 20:12:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)}, 0x0) [ 1971.120054][T12989] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1971.158567][T12993] fuse: Bad value for 'subtype' 20:12:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000040)) [ 1971.190876][ T26] audit: type=1800 audit(1563999132.892:385): pid=12994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17248 res=0 20:12:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x3b6, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:13 executing program 1: r0 = fsopen(&(0x7f0000000000)='securityfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) 20:12:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)}, 0x0) 20:12:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000100), 0x3) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd3082526441", 0x44}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='\x05/cg\t\x00\x00\x00/sxz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb98b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) 20:12:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7001) [ 1971.858900][T13121] XFS (loop2): bad version [ 1971.869747][T13121] XFS (loop2): SB validate failed with error -22. 20:12:13 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x800000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0], 0x2}}, 0x0) 20:12:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0xc080aebe, &(0x7f00000002c0)) 20:12:13 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000001300)={0x0, 0x0, 0x1, [], 0x0}) 20:12:13 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) 20:12:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0], 0x2}}, 0x0) 20:12:14 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000280)=[@increfs={0x40046304, 0x1}], 0x0, 0x0, 0x0}) [ 1972.362261][ T26] audit: type=1800 audit(1563999134.062:386): pid=13254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17241 res=0 20:12:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x500, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:14 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x24) 20:12:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0], 0x2}}, 0x0) 20:12:14 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/\x00y\x8dG\xe0G\x1c\x7f\xca\xad\x17\xe3m\x19\x94\xf1O\x94\x8bB\xd4\x9b@/]\xac7\xfe\xb1\xd6\xa1\xb4]\xdam\x87\xaa\x9b\t\x96', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r1, &(0x7f0000000cc0)=[{&(0x7f00000009c0)=""/166, 0xa6}], 0x1) 20:12:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) lseek(r0, 0x0, 0x0) [ 1972.968286][ T8813] XFS (loop2): bad version [ 1972.973640][T13310] XFS (loop2): SB validate failed with error -22. 20:12:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 20:12:14 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) 20:12:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x900000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f00000066c0), 0xa98, 0x0, 0x0) [ 1973.323092][T13403] 9pnet_virtio: no channels available for device ./file0 20:12:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x13) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:12:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 20:12:15 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 1973.363343][ T26] audit: type=1800 audit(1563999135.062:387): pid=13410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17041 res=0 [ 1973.400311][T13412] 9pnet_virtio: no channels available for device ./file0 20:12:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x600, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:15 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$P9_RREMOVE(r0, &(0x7f0000000040)={0xffffffffffffff16}, 0x2ee) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 20:12:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 20:12:15 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400120010000100697036657273"], 0x3}}, 0x0) [ 1973.895084][ T8813] XFS (loop2): bad version [ 1973.900660][T13432] XFS (loop2): SB validate failed with error -22. 20:12:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400120010000100697036657273"], 0x3}}, 0x0) 20:12:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400120010000100697036657273"], 0x3}}, 0x0) 20:12:15 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x1000000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004"], 0x3}}, 0x0) [ 1974.367793][ T26] audit: type=1800 audit(1563999136.072:388): pid=13465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17287 res=0 20:12:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004"], 0x3}}, 0x0) 20:12:18 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x700, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:18 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0xfeffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x13) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:12:18 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 1976.529593][ T26] audit: type=1800 audit(1563999138.232:389): pid=13479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17393 res=0 20:12:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004"], 0x3}}, 0x0) [ 1976.747760][ T12] XFS (loop2): bad version 20:12:18 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080005"], 0x3}}, 0x0) [ 1976.769750][T13484] XFS (loop2): SB validate failed with error -22. 20:12:18 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080005"], 0x3}}, 0x0) 20:12:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080005"], 0x3}}, 0x0) 20:12:18 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:18 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 20:12:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xa00, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:19 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0xffffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1977.491563][T30452] XFS (loop2): bad version [ 1977.500667][T13528] XFS (loop2): SB validate failed with error -22. [ 1977.565940][ T26] audit: type=1800 audit(1563999139.272:390): pid=13539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17298 res=0 [ 1977.942724][T30452] XFS (loop2): bad version [ 1977.948647][T13528] XFS (loop2): SB validate failed with error -22. 20:12:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x13) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:12:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080005000000"], 0x3}}, 0x0) 20:12:21 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 20:12:21 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x5e00, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:21 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x3}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:21 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1979.687909][ T26] audit: type=1800 audit(1563999141.392:391): pid=13564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17541 res=0 20:12:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080005000000"], 0x3}}, 0x0) [ 1979.879992][T13562] XFS (loop2): bad version [ 1979.885061][T13562] XFS (loop2): SB validate failed with error -22. 20:12:21 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:21 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080005000000"], 0x3}}, 0x0) 20:12:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e000000100002000400120008000500000000"], 0x3}}, 0x0) 20:12:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x13) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:12:24 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x5f00, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:24 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e000000100002000400120008000500000000"], 0x3}}, 0x0) 20:12:24 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e000000100002000400120008000500000000"], 0x3}}, 0x0) [ 1982.826516][ T26] audit: type=1800 audit(1563999144.522:392): pid=13611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17563 res=0 [ 1982.968688][T13610] XFS (loop2): bad version 20:12:24 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:24 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x2}}, 0x0) [ 1983.010443][T13610] XFS (loop2): SB validate failed with error -22. 20:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x2}}, 0x0) 20:12:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x2}}, 0x0) 20:12:27 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x80, 0x800) setsockopt$ax25_int(r0, 0x101, 0xb, &(0x7f0000000100)=0xffffffffffffffff, 0x4) r1 = dup3(r0, r0, 0x80000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'netdevsim0\x00', 0x11}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r3, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 20:12:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:27 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x6200, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x2}}, 0x0) 20:12:27 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x2}}, 0x0) [ 1985.918920][ T26] audit: type=1800 audit(1563999147.622:393): pid=13657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17568 res=0 20:12:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x2}}, 0x0) 20:12:27 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) [ 1986.114122][ T8813] XFS (loop2): bad version [ 1986.121554][T13661] XFS (loop2): SB validate failed with error -22. 20:12:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:28 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:28 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x6e00, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:28 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x10}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:28 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x2, 0x6) write$evdev(r0, &(0x7f0000000040)=[{{0x0, 0x2710}, 0x12, 0x2}], 0x192) 20:12:28 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) [ 1987.066289][T13825] XFS (loop2): bad version [ 1987.070969][T13825] XFS (loop2): SB validate failed with error -22. [ 1987.073911][ T26] audit: type=1800 audit(1563999148.772:394): pid=13916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17564 res=0 20:12:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:29 executing program 4: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x3, 0x5e00, 0x7ffffffc) sync_file_range(r0, 0x0, 0x0, 0x2) 20:12:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xf400, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:29 executing program 4: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x3, 0x5e00, 0x7ffffffc) sync_file_range(r0, 0x0, 0x0, 0x2) 20:12:29 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:29 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x300}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) [ 1988.045711][T14049] XFS (loop2): bad version [ 1988.053389][T14049] XFS (loop2): SB validate failed with error -22. 20:12:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) [ 1988.140029][ T26] audit: type=1800 audit(1563999149.842:395): pid=14128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17562 res=0 20:12:29 executing program 4: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) fallocate(r0, 0x3, 0x5e00, 0x7ffffffc) sync_file_range(r0, 0x0, 0x0, 0x2) 20:12:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000000000000000500", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x2, 0x0, 0x2, r2, 0x1, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x2, r2}) 20:12:30 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xff00, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000000000000000500", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:30 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 1988.984988][T14230] XFS (loop2): bad version [ 1989.007151][T14230] XFS (loop2): SB validate failed with error -22. 20:12:30 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x900}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000000000000000500", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x2ec, 0x20000003, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240)=0xc0000302, 0x4) sendto$inet(r1, &(0x7f0000000140)='#', 0x1, 0x0, 0x0, 0x0) 20:12:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000000000000000050000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) [ 1989.192895][ T26] audit: type=1800 audit(1563999150.892:396): pid=14322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16881 res=0 20:12:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x2, 0x0, 0x2, r2, 0x1, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x0, r2}) 20:12:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000000000000000050000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:31 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:31 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(0xffffffffffffffff) 20:12:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x40800, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000000000000000050000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x3}}, 0x0) 20:12:31 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:31 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(0xffffffffffffffff) [ 1990.042218][T14385] XFS (loop2): bad version 20:12:31 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x4000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:31 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r2, &(0x7f0000000100), 0x1ede5) r3 = accept(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000006940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 20:12:31 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(0xffffffffffffffff) 20:12:31 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1990.090306][T14385] XFS (loop2): SB validate failed with error -22. 20:12:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) [ 1990.274411][ T26] audit: type=1800 audit(1563999151.972:397): pid=14477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16802 res=0 20:12:32 executing program 4: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000100), 0x3) 20:12:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x7ffffff2, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:32 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x3}, 0x2c) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:12:32 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x400000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:32 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x3}, 0x2c) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000380)=@tipc=@name, 0x7f, 0x0}, 0x0) 20:12:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) [ 1991.117201][T14684] XFS (loop2): bad version 20:12:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000080)=0x1a8) [ 1991.142467][T14684] XFS (loop2): SB validate failed with error -22. 20:12:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 1991.259311][ T26] audit: type=1800 audit(1563999152.962:398): pid=14832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16771 res=0 20:12:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) 20:12:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:33 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x7ffffff8, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) [ 1992.145548][T14975] XFS (loop2): bad version [ 1992.152638][T14975] XFS (loop2): SB validate failed with error -22. 20:12:33 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x1000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:33 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffff9c) mmap(&(0x7f0000127000/0x2000)=nil, 0x2000, 0x2000000, 0x110, r1, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) pkey_alloc(0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f00000000c0)='net/rfcomm\x00') ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = semget(0xffffffffffffffff, 0x7, 0xc0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x0, 0x80, 0x20}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0xf) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:12:33 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:34 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:34 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 1992.435675][ T26] audit: type=1800 audit(1563999154.142:399): pid=15082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16995 res=0 20:12:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x7ffffff9, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:34 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) [ 1993.168371][ T8813] XFS (loop2): bad version [ 1993.181968][T15097] XFS (loop2): SB validate failed with error -22. 20:12:35 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x3000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1993.638646][ T26] audit: type=1800 audit(1563999155.342:400): pid=15121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17089 res=0 20:12:36 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffff9c) mmap(&(0x7f0000127000/0x2000)=nil, 0x2000, 0x2000000, 0x110, r1, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) pkey_alloc(0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f00000000c0)='net/rfcomm\x00') ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = semget(0xffffffffffffffff, 0x7, 0xc0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x0, 0x80, 0x20}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0xf) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:12:36 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x7ffffffe, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:36 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:36 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x8000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1994.595922][T15233] XFS (loop2): bad version [ 1994.612021][T15233] XFS (loop2): SB validate failed with error -22. 20:12:36 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) [ 1994.795704][ T26] audit: type=1800 audit(1563999156.502:401): pid=15251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17233 res=0 20:12:36 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:36 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:36 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xffffff1f, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 1995.591513][T15270] XFS (loop2): bad version [ 1995.597717][T15270] XFS (loop2): SB validate failed with error -22. 20:12:37 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffff9c) mmap(&(0x7f0000127000/0x2000)=nil, 0x2000, 0x2000000, 0x110, r1, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) pkey_alloc(0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f00000000c0)='net/rfcomm\x00') ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = semget(0xffffffffffffffff, 0x7, 0xc0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x0, 0x80, 0x20}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0xf) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:12:37 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:37 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x9000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:37 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:37 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xffff8880a398a6a8, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 1996.333156][ T26] audit: type=1800 audit(1563999158.032:402): pid=15394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17305 res=0 20:12:38 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:38 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) [ 1996.546350][T30452] XFS (loop2): bad version [ 1996.551480][T15399] XFS (loop2): SB validate failed with error -22. 20:12:38 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:38 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:38 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x102) socket(0x0, 0x80000000000003, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3f, &(0x7f0000000140), 0x4) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000, 0x42) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 20:12:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xffff8880a398a868, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:39 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x10000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:39 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:39 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 1997.801056][ T26] audit: type=1800 audit(1563999159.502:403): pid=15535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17316 res=0 20:12:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) [ 1998.051379][T15537] XFS (loop2): bad version [ 1998.067034][T15537] XFS (loop2): SB validate failed with error -22. 20:12:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) 20:12:40 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0xffffc90000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:40 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:40 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:40 executing program 4: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) recvmsg$kcm(r1, &(0x7f0000006a40)={&(0x7f00000042c0)=@xdp, 0x80, &(0x7f0000006900)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1, &(0x7f00000069c0)=""/115, 0x73}, 0x0) 20:12:40 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:40 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0xfeffffff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1998.919296][T15777] XFS (loop2): bad version [ 1998.925533][T15777] XFS (loop2): SB validate failed with error -22. [ 1998.954685][ T26] audit: type=1800 audit(1563999160.662:404): pid=15797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17318 res=0 20:12:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae8a, &(0x7f0000000200)={0x7b}) 20:12:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:41 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="25465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:41 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) [ 1999.730406][T15957] XFS (loop2): Invalid superblock magic number 20:12:41 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0xfffffffe}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:41 executing program 4: [ 1999.958308][ T26] audit: type=1800 audit(1563999161.662:405): pid=16034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17318 res=0 20:12:41 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:41 executing program 4: 20:12:42 executing program 4: 20:12:42 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="5d465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000100)={0xfffffdfd}) 20:12:42 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:42 executing program 4: [ 2000.748774][T16163] XFS (loop2): Invalid superblock magic number 20:12:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, 0x0) 20:12:42 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x1000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:42 executing program 4: [ 2000.993400][ T26] audit: type=1800 audit(1563999162.692:406): pid=16183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17310 res=0 20:12:42 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:42 executing program 4: 20:12:42 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, 0x0) 20:12:43 executing program 4: 20:12:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="63465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:43 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:43 executing program 4: 20:12:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, 0x0) 20:12:43 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:43 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x40000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:43 executing program 4: 20:12:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="64465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:43 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:43 executing program 4: 20:12:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)) [ 2002.097720][ T26] audit: type=1800 audit(1563999163.802:407): pid=16236 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17308 res=0 20:12:43 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:43 executing program 4: [ 2002.189720][T16234] XFS (loop2): Invalid superblock magic number 20:12:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)) 20:12:44 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:44 executing program 4: 20:12:44 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:44 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x100000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:44 executing program 4: 20:12:44 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae86, &(0x7f0000000100)) 20:12:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="69465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:44 executing program 4: 20:12:44 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 2003.171688][ T26] audit: type=1800 audit(1563999164.872:408): pid=16387 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17332 res=0 20:12:44 executing program 0: [ 2003.251053][T16385] XFS (loop2): Invalid superblock magic number 20:12:45 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:45 executing program 4: 20:12:45 executing program 0: 20:12:45 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:45 executing program 0: 20:12:45 executing program 4: 20:12:45 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:45 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x300000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="6c465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:45 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:45 executing program 4: 20:12:45 executing program 0: [ 2004.136385][T16432] XFS (loop2): Invalid superblock magic number 20:12:45 executing program 4: [ 2004.207764][ T26] audit: type=1800 audit(1563999165.912:409): pid=16445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17409 res=0 20:12:46 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:46 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:46 executing program 0: 20:12:46 executing program 4: 20:12:46 executing program 0: 20:12:46 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:46 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x800000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:46 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:46 executing program 4: 20:12:46 executing program 0: 20:12:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="6f465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:46 executing program 0: 20:12:46 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:46 executing program 4: [ 2005.204952][ T26] audit: type=1800 audit(1563999166.912:410): pid=16493 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16882 res=0 20:12:47 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) [ 2005.269682][T16483] XFS (loop2): Invalid superblock magic number 20:12:47 executing program 0: 20:12:47 executing program 4: 20:12:47 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:47 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x900000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:47 executing program 4: 20:12:47 executing program 0: 20:12:47 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:47 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="70465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:47 executing program 0: 20:12:47 executing program 4: 20:12:47 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) [ 2006.247193][ T26] audit: type=1800 audit(1563999167.952:411): pid=16538 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17303 res=0 20:12:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 2006.398416][T16536] XFS (loop2): Invalid superblock magic number 20:12:48 executing program 0: 20:12:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xc0109207, 0x20000000) [ 2006.851004][T16536] XFS (loop2): Invalid superblock magic number 20:12:48 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x1000000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:48 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:12:48 executing program 0: 20:12:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) 20:12:48 executing program 0: 20:12:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="73465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:48 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) 20:12:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(r0) [ 2007.232509][ T26] audit: type=1800 audit(1563999168.932:412): pid=16582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17489 res=0 20:12:49 executing program 0: 20:12:49 executing program 0: 20:12:49 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) [ 2007.561794][T16594] XFS (loop2): Invalid superblock magic number 20:12:49 executing program 4: [ 2008.028619][T16594] XFS (loop2): Invalid superblock magic number 20:12:49 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0xfeffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:49 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) close(r0) 20:12:49 executing program 0: 20:12:49 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) 20:12:49 executing program 4: [ 2008.337997][ T26] audit: type=1800 audit(1563999170.042:413): pid=16735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16882 res=0 20:12:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="75465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:50 executing program 4: 20:12:50 executing program 0: 20:12:50 executing program 5: 20:12:50 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) close(r0) 20:12:50 executing program 0: 20:12:50 executing program 4: [ 2008.808009][T16754] XFS (loop2): Invalid superblock magic number 20:12:50 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0xffffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:50 executing program 5: 20:12:50 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) close(r0) 20:12:50 executing program 0: 20:12:50 executing program 4: [ 2009.388027][ T26] audit: type=1800 audit(1563999171.092:414): pid=16782 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17347 res=0 20:12:51 executing program 0: 20:12:51 executing program 4: 20:12:51 executing program 5: 20:12:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="78465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:51 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(0xffffffffffffffff) 20:12:51 executing program 0: 20:12:51 executing program 5: [ 2010.003413][T16803] XFS (loop2): Invalid superblock magic number 20:12:51 executing program 5: 20:12:51 executing program 4: 20:12:51 executing program 0: 20:12:51 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x3}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:51 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(0xffffffffffffffff) 20:12:52 executing program 5: 20:12:52 executing program 4: 20:12:52 executing program 0: [ 2010.435985][ T26] audit: type=1800 audit(1563999172.132:415): pid=16826 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17344 res=0 20:12:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58255342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:52 executing program 4: 20:12:52 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) close(0xffffffffffffffff) 20:12:52 executing program 5: 20:12:52 executing program 0: 20:12:52 executing program 5: 20:12:52 executing program 0: [ 2011.020721][T16850] XFS (loop2): Invalid superblock magic number 20:12:52 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:52 executing program 4: 20:12:52 executing program 5: 20:12:52 executing program 1: 20:12:52 executing program 0: [ 2011.459975][ T26] audit: type=1800 audit(1563999173.162:416): pid=16873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17335 res=0 20:12:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58462542c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:53 executing program 0: 20:12:53 executing program 1: 20:12:53 executing program 5: 20:12:53 executing program 4: 20:12:53 executing program 1: 20:12:53 executing program 5: [ 2012.065567][T16894] XFS (loop2): Invalid superblock magic number 20:12:54 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:54 executing program 0: 20:12:54 executing program 4: 20:12:54 executing program 5: 20:12:54 executing program 1: [ 2012.500182][ T26] audit: type=1800 audit(1563999174.202:417): pid=16923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17335 res=0 20:12:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465d42c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:54 executing program 5: 20:12:54 executing program 4: 20:12:54 executing program 1: 20:12:54 executing program 0: 20:12:54 executing program 5: 20:12:54 executing program 0: [ 2013.065414][T16941] XFS (loop2): Invalid superblock magic number 20:12:55 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x10}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:55 executing program 4: 20:12:55 executing program 1: 20:12:55 executing program 0: 20:12:55 executing program 5: [ 2013.503644][ T26] audit: type=1800 audit(1563999175.202:418): pid=16964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16995 res=0 20:12:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c20744d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:55 executing program 4: 20:12:55 executing program 5: 20:12:55 executing program 0: 20:12:55 executing program 1: 20:12:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) 20:12:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 2014.075797][T30452] XFS (loop2): bad version [ 2014.082847][T16981] XFS (loop2): SB validate failed with error -22. 20:12:56 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x300}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf00000000000000, 0x0, &(0x7f0000000480)) 20:12:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000000c0)) 20:12:56 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4, 0xffffffffffffff71}, {0x99e1, 0xffff}]}, 0x14, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockname$inet6(r1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = gettid() ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000400)=""/221) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) 20:12:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 2014.560575][ T26] audit: type=1800 audit(1563999176.262:419): pid=17133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17630 res=0 20:12:56 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x6, 0x0, &(0x7f00000005c0)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4, 0xffffffffffffff71}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) statfs(&(0x7f0000000600)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="b702000003400000bfa3000000000100070300000cf5ffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000064040400010000000000fe1e00000000850000006c080000b7000000000000009500000000000000000000000000000000006d92f0297622df5654de93e0593e0a894ba117511b05a2e77000e054a438916eb4dee88a205a8ba5861e4407b4f9a220b7cbf02ac414ee50142624991510b5832018234563849c58706dc2ddb7c06b350634bed72459ff640fe9bf"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000400)=""/221) tkill(0x0, 0x3b) 20:12:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000000c0)) 20:12:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c20944d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', 0x300}) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1000000000000184) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) sched_setparam(r2, &(0x7f0000000040)=0x23) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) 20:12:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000004080501ff0080ffbdfffbae3ecdfb000c0003002f00001c7d0a00010c0002000002fafb96192880"], 0x2c}}, 0x0) 20:12:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x200200}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0x0, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2015.096923][T30452] XFS (loop2): bad version [ 2015.104469][T17326] XFS (loop2): SB validate failed with error -22. [ 2015.215878][T17346] device lo entered promiscuous mode [ 2015.320054][T17350] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 2015.381333][T17350] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 20:12:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2d, 'pids'}]}, 0x6) 20:12:57 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x900}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:57 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000180)) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x10000101) 20:12:57 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000007340)=ANY=[@ANYBLOB="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"], 0x24, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ftruncate(r0, 0x0) 20:12:57 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000700)='/dev/uhid\x00', 0x2, 0x0) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/29, 0x1d}], 0x1) write$UHID_CREATE(r0, &(0x7f0000000440)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000080)=""/22, 0x16}, 0x120) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/26, 0x1a}, {&(0x7f0000000140)=""/150, 0x96}], 0x2) write$UHID_DESTROY(r0, 0x0, 0x0) [ 2015.812903][ T26] audit: type=1800 audit(1563999177.512:420): pid=17465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17624 res=0 20:12:57 executing program 0: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2cc20f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)=':', 0x1}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2015.939493][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2015.955358][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.003607][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.026110][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.033943][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.045210][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 20:12:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c20a44d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2016.056351][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.074914][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.082828][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 20:12:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0xfffffffffffffff9) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) dup2(r0, r1) [ 2016.106756][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.117863][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.125900][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.133709][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.141606][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.149379][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.157209][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.165439][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.173142][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.181469][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.194957][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.202590][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.216710][T30452] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2016.250083][T30452] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 20:12:58 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="d3d2b93c3889920400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe8dac0726906da58a5d1ab066f24351eda628769d37cbcb5c0c5dbc1b227d10d8ea", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2b", @ANYRESHEX], 0x0, 0xe5}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2016.441456][T17595] XFS (loop2): bad version [ 2016.453857][T17595] XFS (loop2): SB validate failed with error -22. 20:12:58 executing program 4: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000600)=""/164) close(r1) flock(r0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) clone(0x8860000, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000005c0)={'veth1\x00', 0x200000005002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2007fff) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x4040, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000940)={'erspan0\x00', {0x2, 0x4e20, @multicast1}}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000400)={0x1, 0x0, {0x3c, 0x15, 0x1, 0x17, 0x4, 0x0, 0x6, 0x80}}) write(r7, &(0x7f00000001c0), 0xfffffec8) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) setxattr$security_ima(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="040cffffee9e0a2f5c17790df0ffffff26445a99d6d2fa18d0512c27ffefef48a5d00b83335e7f06f335e31d79597074ef4f59d6c5ad66cd279c40271c6eff79263490dc8ea53c372ec33bb73f3b5ea903a039b6502c7f073d6d3f31402e63efa96f350f6a6328c264db0088f87ef4fe3764c220f1e69cd254a5f14b382f0095593e845aa67ed01fdbf16ce62b83cf53a342dd17659d2ad8b89e3032cf8e23c71efbab7d8ffb5d3e86017cab4ee392a48313b867d75d96132d57c5d7f3674a6ab06a50c777fce8ae8de777"], 0x1, 0x3) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000300)=0x6) setxattr$security_selinux(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x3) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000480)={'ip6erspan0\x00', 0x4000}) ioprio_get$pid(0x3, 0x0) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 20:12:58 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x4000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:58 executing program 0: open(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000600)='./bus\x00', &(0x7f0000000640)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0x87, 0x0, &(0x7f0000000780), 0x0, 0x0) [ 2016.652564][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.694982][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.731386][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.785077][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.836034][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.845800][ T26] audit: type=1800 audit(1563999178.552:421): pid=17755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16566 res=0 [ 2016.858050][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.899096][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.910406][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.929524][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 20:12:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x1000000000000003, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000001c0)="240000002a0007031dfffd946fa2830020200a0009000000000000000004000000000000280000001100ffffba16a0aa1c0009e3966cf055d90f15a322e029eee7f817c37218fea642ef6b2c", 0x4c}], 0x1}, 0x0) [ 2016.943405][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.953791][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.969683][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2016.989653][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.001517][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.040738][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.064064][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.089765][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 20:12:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x40400, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24000, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002702000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d640500000000004504000000ffffffb5040000000040005704000010000020620700fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 20:12:58 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="220000008717edbdf8d3d97e0900000000000000000000081319961f702017c7ef03f4da11f30a2599844245803c2af5f70a862bfefb9e0ab3"], 0x1}}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getuid() r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x400000000003c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 2017.109538][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.131033][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.158097][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.173068][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.183833][ T681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2017.200252][ T681] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 20:12:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23b44d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:12:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='[%\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000019c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001a00)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001a40)={r4, r2}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r6 = getpid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xe8, 0x2, 0x0, 0x8, 0x0, 0x2, 0x2, 0x80, 0xf234, 0x3, 0x3, 0x7, 0x0, 0x0, 0xfffffffffffffeff, 0x23, 0x5, 0x4000000, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x391, 0x9, 0x3, 0x400, 0x3, 0xfffffffffffffffb, 0x0, 0xbea5, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) perf_event_open(0x0, r6, 0xd, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r5, &(0x7f0000001b40)='cpuset.memory_pressure\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) [ 2017.338785][T18036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:12:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x0) 20:12:59 executing program 5: io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x0, 0x3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x23) sendto$inet(r1, 0x0, 0x10b, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x319) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r2+30000000}) [ 2017.613397][T18042] XFS (loop2): bad version 20:12:59 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x400000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2017.664972][T18042] XFS (loop2): SB validate failed with error -22. 20:12:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x40400, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24000, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002702000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d640500000000004504000000ffffffb5040000000040005704000010000020620700fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 20:12:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='[%\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000019c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001a00)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001a40)={r4, r2}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r6 = getpid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xe8, 0x2, 0x0, 0x8, 0x0, 0x2, 0x2, 0x80, 0xf234, 0x3, 0x3, 0x7, 0x0, 0x0, 0xfffffffffffffeff, 0x23, 0x5, 0x4000000, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x391, 0x9, 0x3, 0x400, 0x3, 0xfffffffffffffffb, 0x0, 0xbea5, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) perf_event_open(0x0, r6, 0xd, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r5, &(0x7f0000001b40)='cpuset.memory_pressure\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) [ 2017.874121][ T26] audit: type=1800 audit(1563999179.572:422): pid=18249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16674 res=0 20:12:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xffffffffffffff26) 20:12:59 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0e630c40"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@register_looper], 0x289, 0x0, &(0x7f0000000680)}) 20:12:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x40400, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24000, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002702000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d640500000000004504000000ffffffb5040000000040005704000010000020620700fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 20:12:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c2335cd0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2018.368171][T18457] debugfs: File '18437' in directory 'proc' already present! 20:13:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) io_setup(0x0, &(0x7f0000000180)) truncate(0x0, 0xa00) getpid() connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x23) sendto$inet(r0, 0x0, 0x10b, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x7, &(0x7f00000003c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r1+30000000}) [ 2018.578084][T18490] XFS (loop2): bad version [ 2018.585411][T18490] XFS (loop2): SB validate failed with error -22. 20:13:00 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xffffffffffffff7a) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) 20:13:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = memfd_create(&(0x7f0000000180)='D', 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ftruncate(r2, 0x1000000) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) setns(r0, 0x10000000) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000080)=0x4, 0x4) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f00000037c0)=0xf10001, 0xfffffdef) openat$ppp(0xffffffffffffff9c, 0x0, 0x40, 0x0) 20:13:00 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x1000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000580)=""/154) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x180) r3 = dup2(r1, r1) prctl$PR_SET_UNALIGN(0x6, 0x7) r4 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) getpid() ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x480200) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000340)=0xc) r5 = getpid() socket$inet_tcp(0x2, 0x1, 0x0) getpriority(0x0, r5) bind$inet(r4, &(0x7f0000000300)={0x2, 0x4e20, @broadcast}, 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000180)=0x14) gettid() ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000400)=""/134) clock_getres(0x0, 0x0) sendto$inet(r4, 0x0, 0xffffffe3, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f00000003c0)=0xe1) shutdown(r4, 0x1) 20:13:00 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x10e, 0x9, 0x20000000000004, 0x0, 0x0}, 0x2c) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3) wait4(0x0, 0x0, 0x0, 0x0) [ 2018.888831][ T26] audit: type=1800 audit(1563999180.592:423): pid=18615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16897 res=0 20:13:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d656e675e650000000000000000000000181b526bb5957004f38e0000000000000000000000000000001f000000a005000058024f9f80a3306e074fe2d7751f00aa4b81000000000000000000004000b00000000098ec6c"], 0x1) 20:13:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c2335dd0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:00 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x544, 0x0) 20:13:01 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) wait4(r1, &(0x7f00000001c0), 0x0, &(0x7f0000000200)) 20:13:01 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) truncate(0x0, 0x0) pipe(&(0x7f0000000080)) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x23) sendto$inet(r0, 0x0, 0x10b, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r1+30000000}) [ 2019.555068][T18768] XFS (loop2): bad version [ 2019.585363][T18768] XFS (loop2): SB validate failed with error -22. [ 2019.760129][T18855] ptrace attach of "/root/syz-executor.1"[8798] was attempted by "/root/syz-executor.1"[18855] 20:13:01 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x3000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=""/3, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x9}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x0, 0x4, 0x5}, 0x10}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)={[{0x0, 'io'}, {0x2f, 'rdma'}, {0x0, 'rdma'}, {0x2b, 'memory'}]}, 0x18) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 20:13:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = memfd_create(&(0x7f0000000180)='D', 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ftruncate(r2, 0x1000000) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) setns(r0, 0x10000000) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000080)=0x4, 0x4) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f00000037c0)=0xf10001, 0xfffffdef) openat$ppp(0xffffffffffffff9c, 0x0, 0x40, 0x0) 20:13:01 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/dlm-control\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) [ 2020.007074][ T26] audit: type=1800 audit(1563999181.712:424): pid=18896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16897 res=0 [ 2020.216083][T18973] dlm: non-version read from control device 0 20:13:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd029bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0xffad}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 20:13:02 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) socket$inet(0x2, 0xe, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040), 0xa) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 20:13:02 executing program 1: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xb5) [ 2020.664769][T18992] XFS (loop2): bad version [ 2020.669822][T18992] XFS (loop2): SB validate failed with error -22. 20:13:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x277, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}, 0x10120) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) 20:13:02 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) 20:13:02 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x8000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x7c, &(0x7f00000002c0), 0x8) 20:13:02 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) [ 2021.224042][ T26] audit: type=1800 audit(1563999182.922:425): pid=19190 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17073 res=0 20:13:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x717000, 0x0, 0x0, 0x0) 20:13:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000101]}) 20:13:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd049bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:03 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) [ 2021.815837][T19232] XFS (loop2): bad version [ 2021.821139][T19232] XFS (loop2): SB validate failed with error -22. 20:13:03 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) 20:13:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 20:13:03 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x9000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:03 executing program 0: ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 20:13:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000104]}) 20:13:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x32, 0x0, 0x0) 20:13:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd059bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2022.427500][ T26] audit: type=1800 audit(1563999184.132:426): pid=19364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17121 res=0 20:13:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x400000b7]}) 20:13:04 executing program 0: ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 20:13:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2022.849324][T19401] XFS (loop2): bad version [ 2022.854178][T19401] XFS (loop2): SB validate failed with error -22. 20:13:04 executing program 0: ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 20:13:04 executing program 5: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x94, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000001700000000006272696467653000000000000000000076657468305f746f5f627269646365000180c2000000000000000000aaaaaaaaaa000000000000000000700000"]}, 0x10c) 20:13:04 executing program 4: fdatasync(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() 20:13:04 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) 20:13:05 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x10000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:05 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) 20:13:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd069bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000107]}) 20:13:05 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) [ 2023.720191][ T26] audit: type=1800 audit(1563999185.422:427): pid=19620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16659 res=0 20:13:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0x0, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, &(0x7f0000000040), 0x0, r2}) [ 2023.799830][T19604] XFS (loop2): bad version [ 2023.808809][T19604] XFS (loop2): SB validate failed with error -22. 20:13:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:05 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)=0x7fffffff) 20:13:05 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 20:13:05 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x8, 0xfffffffffffffff6) 20:13:06 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 20:13:06 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:06 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000400)={0x8d, 0x7d, 0x0, {{0x0, 0x6d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'vboxnet0\\', 0x17, '$cpusetmime_typevmnet1\\', 0xf, 'vmnet1$eth1eth1', 0xb, '/dev/audio\x00'}, 0xb, '/dev/audio\x00'}}, 0x8d) 20:13:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd079bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:06 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 20:13:06 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff3b}, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x0, 0xb06}, 0x14}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) write$P9_ROPEN(r2, 0x0, 0x0) 20:13:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x6, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 20:13:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2024.940341][ T26] audit: type=1800 audit(1563999186.642:428): pid=19787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17359 res=0 [ 2025.011044][T19782] XFS (loop2): bad version [ 2025.017282][T19782] XFS (loop2): SB validate failed with error -22. 20:13:06 executing program 5: 20:13:06 executing program 4: 20:13:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:07 executing program 5: 20:13:07 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:07 executing program 4: 20:13:07 executing program 5: 20:13:07 executing program 0: 20:13:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd0a9bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:07 executing program 0: 20:13:07 executing program 4: [ 2025.944411][ T26] audit: type=1800 audit(1563999187.642:429): pid=20031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16535 res=0 20:13:07 executing program 5: [ 2026.120458][T30452] XFS (loop2): bad version 20:13:07 executing program 0: 20:13:07 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:07 executing program 4: [ 2026.151753][T20037] XFS (loop2): SB validate failed with error -22. [ 2026.672376][T30452] XFS (loop2): bad version [ 2026.678618][T20037] XFS (loop2): SB validate failed with error -22. 20:13:08 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:08 executing program 5: 20:13:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e52afb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 20:13:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000140)) 20:13:08 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2026.965265][ T26] audit: type=1800 audit(1563999188.672:430): pid=20083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16961 res=0 20:13:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd109bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:08 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$P9_RREMOVE(r0, &(0x7f0000000040)={0xffffffffffffff16}, 0x2ee) 20:13:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000100), 0x3) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135", 0x45}], 0x1}, 0x0) socket$kcm(0xa, 0x1, 0x0) 20:13:08 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:08 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001726ed12806cd20010e52fe6a5dd80009d00010800f60000000300f87f000a640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 20:13:09 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) [ 2027.246621][T20095] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:13:09 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2027.509035][T20114] XFS (loop2): bad version [ 2027.513723][T20114] XFS (loop2): SB validate failed with error -22. 20:13:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:09 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) 20:13:09 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:09 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x20, 0x2) write$UHID_INPUT2(r0, &(0x7f00000000c0)={0xc, 0x4a, "c3fff653c85de094e5e16f4195e63c544d76199b1a9d12c7e24252521aa3579b148844499e3ce008db87e4bcc12c99c52ce4938c0f286acd830e08d74c5b2172ca4f590f3f7eed1303ca"}, 0x50) 20:13:09 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2027.937605][ T26] audit: type=1800 audit(1563999189.642:431): pid=20227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17265 res=0 20:13:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd149bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:09 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) 20:13:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(0x0, 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc0, 0x0) 20:13:09 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:13:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:10 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) [ 2028.561678][T20254] XFS (loop2): bad version [ 2028.578816][T20254] XFS (loop2): SB validate failed with error -22. 20:13:10 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:10 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:13:10 executing program 4: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000003c0)) 20:13:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x4, 0x100000001, 0xfffffffffffffffc, 0x7, 0x12, 0x14f6, 0x1, 0xec77, 0xeaf, 0x4, 0x5, 0x8000}) socket$inet(0x10, 0x0, 0x44) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 20:13:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2029.078330][ T26] audit: type=1800 audit(1563999190.782:432): pid=20399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16516 res=0 20:13:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd309bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:10 executing program 4: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000003c0)) 20:13:10 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:11 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:13:11 executing program 4: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000003c0)) 20:13:11 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2029.564765][T20418] XFS (loop2): bad version [ 2029.579801][T20418] XFS (loop2): SB validate failed with error -22. 20:13:11 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:11 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:11 executing program 4: r0 = syz_open_dev$video(0x0, 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) 20:13:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 20:13:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f00000001c0), 0x4) 20:13:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd3b9bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:11 executing program 4: r0 = syz_open_dev$video(0x0, 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) [ 2030.164746][T20558] vivid-000: ================= START STATUS ================= [ 2030.172525][T20558] vivid-000: FM Deviation: 75000 [ 2030.197235][T20558] vivid-000: ================== END STATUS ================== 20:13:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2030.318925][ T26] audit: type=1800 audit(1563999192.012:433): pid=20564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17404 res=0 [ 2030.371370][T20572] vivid-000: ================= START STATUS ================= 20:13:12 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, &(0x7f0000000000)) 20:13:12 executing program 4: r0 = syz_open_dev$video(0x0, 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) [ 2030.452468][T20572] vivid-000: FM Deviation: 75000 [ 2030.466365][ T681] XFS (loop2): bad version [ 2030.488766][T20570] XFS (loop2): SB validate failed with error -22. [ 2030.513689][T20572] vivid-000: ================== END STATUS ================== 20:13:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:13:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:12 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:12 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) 20:13:12 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, &(0x7f0000000000)) 20:13:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a255cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:13 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, &(0x7f0000000000)) 20:13:13 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) [ 2031.499836][T20720] XFS (loop2): bad version [ 2031.510992][T20720] XFS (loop2): SB validate failed with error -22. [ 2031.540521][ T26] audit: type=1800 audit(1563999193.242:434): pid=20731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16516 res=0 20:13:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:13:13 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, &(0x7f0000000000)) 20:13:13 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000003c0)) 20:13:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:13:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x900000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a5c5cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:14 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000003c0)) 20:13:14 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)) 20:13:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0) 20:13:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:13:14 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)) 20:13:14 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000003c0)) [ 2032.701374][T20775] XFS (loop2): bad version [ 2032.707744][T20775] XFS (loop2): SB validate failed with error -22. [ 2032.714473][ T26] audit: type=1800 audit(1563999194.412:435): pid=20790 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17639 res=0 20:13:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0) 20:13:14 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000003c0)) 20:13:14 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)) 20:13:15 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, 0x0) 20:13:15 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:13:15 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, &(0x7f0000000000)) 20:13:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd402aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0) 20:13:15 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, 0x0) [ 2033.767226][T20830] XFS (loop2): bad version [ 2033.773042][T20830] XFS (loop2): SB validate failed with error -22. 20:13:15 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x101, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, 0x0) 20:13:15 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, &(0x7f0000000000)) 20:13:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x0, 0x0, [0x40000106]}) [ 2033.896574][ T26] audit: type=1800 audit(1563999195.602:436): pid=20846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17635 res=0 20:13:15 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, &(0x7f0000000000)) 20:13:15 executing program 4: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x7, {0x8001, 0x5}}) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f00000000c0)) 20:13:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x0, 0x0, [0x40000106]}) 20:13:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd403aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:16 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, &(0x7f0000000000)) 20:13:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x0, 0x0, [0x40000106]}) 20:13:16 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0xfeffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:16 executing program 4: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x7, {0x8001, 0x5}}) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f00000000c0)) 20:13:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x42b, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'caif0\x00'}}}}}, 0x34}}, 0x0) [ 2035.001425][T20991] XFS (loop2): bad version [ 2035.009134][T20991] XFS (loop2): SB validate failed with error -22. 20:13:16 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, &(0x7f0000000000)) 20:13:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b}) [ 2035.081881][ T26] audit: type=1800 audit(1563999196.782:437): pid=21006 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17585 res=0 20:13:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) [ 2035.341906][T21015] Started in network mode [ 2035.367581][T21015] Own node identity , cluster identity 4711 [ 2035.398115][T21015] Failed to obtain node identity 20:13:17 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, &(0x7f0000000000)) [ 2035.434963][T21015] Enabling of bearer rejected, failed to enable media 20:13:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b}) 20:13:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd404aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:17 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)) 20:13:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b}) 20:13:17 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e505e6a5dd80009d00010800f60000000300f87f000a640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2035.993486][T21140] XFS (loop2): bad version [ 2036.009478][T21140] XFS (loop2): SB validate failed with error -22. 20:13:17 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:17 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)) 20:13:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f00000002c0)='r', 0x1, 0xffffffffffffffff) fsopen(0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:13:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) close(r3) socket$inet_udplite(0x2, 0x2, 0x88) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r3) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="8c"], 0x1) 20:13:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) [ 2036.342958][ T26] audit: type=1800 audit(1563999198.042:438): pid=21167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17651 res=0 20:13:18 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)) 20:13:18 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 20:13:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd405aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) tkill(0x0, 0x3b) 20:13:18 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) [ 2037.139540][T21302] XFS (loop2): bad version [ 2037.144494][T21302] XFS (loop2): SB validate failed with error -22. 20:13:19 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:19 executing program 4: r0 = memfd_create(&(0x7f0000000280)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/188, 0xbc}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) write(r2, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x610b7609274eb09, 0x0, 0x0, 0x800e00560) shutdown(r2, 0x0) 20:13:20 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) dup2(r2, r1) recvfrom$inet(r2, 0x0, 0x20e6d29dfb76313f, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) 20:13:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) poll(&(0x7f0000000240)=[{}, {r0}, {}, {r0}], 0x4, 0x800000000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/8, 0x8}, {0x0}], 0x2) shutdown(r1, 0x0) [ 2038.555752][ T26] audit: type=1800 audit(1563999200.262:440): pid=21690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17666 res=0 20:13:20 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) [ 2038.704798][T21579] XFS (loop2): bad version [ 2038.715746][T21579] XFS (loop2): SB validate failed with error -22. 20:13:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) poll(&(0x7f0000000240)=[{}, {r0}, {}, {}], 0x4, 0x800000000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/8, 0x8}, {0x0}], 0x2) shutdown(r1, 0x0) 20:13:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd407aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:20 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:20 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:21 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) [ 2039.423359][T22024] XFS (loop2): bad version [ 2039.428122][T22024] XFS (loop2): SB validate failed with error -22. 20:13:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) tkill(0x0, 0x0) 20:13:21 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:21 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:21 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)) [ 2039.796916][ T26] audit: type=1800 audit(1563999201.502:441): pid=22155 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17659 res=0 20:13:21 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:21 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd408aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:22 executing program 1: syz_open_procfs(0x0, 0x0) memfd_create(0x0, 0x3) r0 = gettid() write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0xf7b6ccbe803abac9) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 20:13:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) [ 2040.594379][T22322] XFS (loop2): bad version [ 2040.599146][T22322] XFS (loop2): SB validate failed with error -22. 20:13:22 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r2, 0x1, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x2, r2, 0x4}) 20:13:22 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:22 executing program 1: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000000)=""/50, 0x22, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) [ 2041.127530][ T26] audit: type=1800 audit(1563999202.832:442): pid=22507 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17665 res=0 20:13:22 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 20:13:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd409aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:23 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 20:13:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:23 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 2041.653630][T30452] XFS (loop2): bad version [ 2041.671684][T22570] XFS (loop2): SB validate failed with error -22. 20:13:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x2ec, 0x20000003, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240)=0xc0000302, 0x4) sendto$inet(r1, &(0x7f0000000140)='#', 0xfffff, 0x0, 0x0, 0x0) 20:13:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:23 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") capget(&(0x7f0000000300), &(0x7f0000000340)) 20:13:23 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) [ 2042.264463][ T26] audit: type=1800 audit(1563999203.962:443): pid=22762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17666 res=0 20:13:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd40aaa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") capget(&(0x7f0000000300), 0x0) 20:13:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:24 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2042.674691][T22875] XFS (loop2): bad version [ 2042.685374][T22875] XFS (loop2): SB validate failed with error -22. 20:13:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f000000c600)=[{{&(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, 0x0}}], 0x1, 0x0) 20:13:24 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:24 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:24 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) io_setup(0x1004, &(0x7f0000000200)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 20:13:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:13:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd40baa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:25 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) [ 2043.430554][ T26] audit: type=1800 audit(1563999205.132:444): pid=23028 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17681 res=0 20:13:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:13:25 executing program 1: r0 = socket$inet(0x2, 0x3, 0x5) sendmmsg$inet_sctp(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev}], 0x20}], 0x1, 0x40800) [ 2043.755120][T23131] XFS (loop2): bad version [ 2043.762321][T23131] XFS (loop2): SB validate failed with error -22. 20:13:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:25 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:25 executing program 1: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) syz_open_dev$evdev(&(0x7f0000012fee)='/.ev/input/event#\x00', 0x0, 0x0) 20:13:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:25 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:13:26 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd40caa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:26 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) [ 2044.632061][ T26] audit: type=1800 audit(1563999206.332:445): pid=23277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16576 res=0 20:13:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) [ 2044.853827][ T8813] XFS (loop2): bad version [ 2044.862411][T23285] XFS (loop2): SB validate failed with error -22. 20:13:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002e80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 20:13:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:27 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:27 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 20:13:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:27 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd40daa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2045.800378][ T26] audit: type=1800 audit(1563999207.502:446): pid=23535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17670 res=0 20:13:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:27 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) [ 2045.916023][T23537] XFS (loop2): bad version [ 2045.922014][T23537] XFS (loop2): SB validate failed with error -22. 20:13:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:27 executing program 1: setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x10e, 0x9, 0x20000000000004, 0x0, 0x0}, 0x2c) 20:13:27 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:28 executing program 1: setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x10e, 0x9, 0x20000000000004, 0x0, 0x0}, 0x2c) 20:13:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:28 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@remote}, 0x14) 20:13:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd40eaa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:28 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(0xffffffffffffffff) 20:13:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x10) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000000)='\\\x00', &(0x7f00000000c0)='./file0\x00', r1) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) write$vhci(r1, &(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) getrandom(&(0x7f00000002c0)=""/194, 0xc2, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x659e, @local, 0x100000000}, @in6={0xa, 0x4e22, 0x8, @local, 0x34d2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x4d, @local}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0xb0) [ 2047.125580][ T26] audit: type=1800 audit(1563999208.832:447): pid=23767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16611 res=0 [ 2047.223458][T23763] XFS (loop2): bad version [ 2047.229837][T23763] XFS (loop2): SB validate failed with error -22. 20:13:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 20:13:29 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(0xffffffffffffffff) 20:13:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x10) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000000)='\\\x00', &(0x7f00000000c0)='./file0\x00', r1) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) write$vhci(r1, &(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) getrandom(&(0x7f00000002c0)=""/194, 0xc2, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x659e, @local, 0x100000000}, @in6={0xa, 0x4e22, 0x8, @local, 0x34d2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x4d, @local}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0xb0) 20:13:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 20:13:29 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(0xffffffffffffffff) 20:13:29 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 20:13:29 executing program 1: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') 20:13:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd40faa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:29 executing program 4: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) [ 2048.214688][ T26] audit: type=1800 audit(1563999209.912:448): pid=23952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16690 res=0 [ 2048.306592][T23951] XFS (loop2): bad version [ 2048.311118][T23951] XFS (loop2): SB validate failed with error -22. 20:13:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:30 executing program 4: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr=0x1000000, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) 20:13:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:30 executing program 4: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:30 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x102) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000000)) setsockopt$inet_int(r0, 0x0, 0x3f, &(0x7f0000000140)=0x3, 0x4) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000, 0x42) 20:13:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:30 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd410aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2049.335503][ T26] audit: type=1800 audit(1563999211.042:449): pid=24113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16833 res=0 20:13:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x102) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000000)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) socket(0x200000000000011, 0x80000000000003, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0x3, 0x4) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) 20:13:31 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) [ 2049.450666][T24118] XFS (loop2): bad version [ 2049.471879][T24118] XFS (loop2): SB validate failed with error -22. 20:13:31 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:31 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:31 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000000)=""/170, &(0x7f00000000c0)=0xaa) 20:13:31 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd411aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:32 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) symlink(0x0, 0x0) quotactl(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:13:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2050.414530][ T26] audit: type=1800 audit(1563999212.122:450): pid=24171 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16611 res=0 20:13:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, &(0x7f0000000000)=""/32, 0x20) 20:13:32 executing program 5: r0 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x6) lseek(r0, 0x0, 0x2) [ 2050.622842][T24181] XFS (loop2): bad version [ 2050.633237][T24181] XFS (loop2): SB validate failed with error -22. 20:13:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:13:32 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:32 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, &(0x7f0000000000)=""/32, 0x20) 20:13:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x10, &(0x7f0000000080)={@remote}, 0x14) 20:13:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:13:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd412aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x23) sendto$inet(r0, 0x0, 0x10b, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) 20:13:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:13:33 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, &(0x7f0000000000)=""/32, 0x20) [ 2051.403118][ T26] audit: type=1800 audit(1563999213.102:451): pid=24225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16575 res=0 20:13:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 20:13:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:33 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) [ 2051.728778][T24239] XFS (loop2): bad version [ 2051.733312][T24239] XFS (loop2): SB validate failed with error -22. 20:13:33 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:33 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:33 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 20:13:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd413aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:34 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:34 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 20:13:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2052.463649][ T26] audit: type=1800 audit(1563999214.162:452): pid=24381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16576 res=0 20:13:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:34 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) [ 2052.835047][ T8813] XFS (loop2): bad version [ 2052.844469][T24396] XFS (loop2): SB validate failed with error -22. 20:13:35 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x102) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) 20:13:35 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2053.491727][ T26] audit: type=1800 audit(1563999215.192:453): pid=24433 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16578 res=0 20:13:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd414aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001700)={'dummy0\x00', &(0x7f00000016c0)=@ethtool_rxfh={0x0, 0x0, 0x0, 0x0, 0x0, '6$8'}}) 20:13:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) [ 2053.857033][T24444] XFS (loop2): bad version [ 2053.863411][T24444] XFS (loop2): SB validate failed with error -22. 20:13:35 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:35 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:36 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380), 0xc) 20:13:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) flistxattr(r0, &(0x7f0000000000)=""/32, 0x20) 20:13:36 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd415aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, &(0x7f0000000000)=""/32, 0x20) 20:13:36 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) eventfd(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) getcwd(0x0, 0xffffffffffffff4d) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2054.571684][ T26] audit: type=1800 audit(1563999216.262:454): pid=24482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17201 res=0 20:13:36 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:36 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, &(0x7f0000000000)=""/32, 0x20) 20:13:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000740)=[{r1}], 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote={0xfe, 0x80, [0x0, 0x3f00000000000000]}}, 0x14) [ 2054.896127][T24497] XFS (loop2): bad version [ 2054.907874][T24497] XFS (loop2): SB validate failed with error -22. [ 2054.954906][ C1] IPv6 header not found [ 2054.959866][ C1] IPv6 header not found [ 2054.965757][ C1] IPv6 header not found [ 2054.969952][ C1] IPv6 header not found [ 2054.974665][ C1] IPv6 header not found [ 2054.978858][ C1] IPv6 header not found 20:13:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, &(0x7f0000000000)=""/32, 0x20) 20:13:37 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000740)=[{r1}], 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote={0xfe, 0x80, [0x0, 0x3f00000000000000]}}, 0x14) 20:13:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x0) 20:13:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd44caa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:37 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 20:13:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x0) [ 2055.634563][ T26] audit: type=1800 audit(1563999217.342:455): pid=24539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17201 res=0 20:13:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:37 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) 20:13:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x0) 20:13:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2056.060585][T24557] XFS (loop2): bad version [ 2056.065469][T24557] XFS (loop2): SB validate failed with error -22. 20:13:38 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:38 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) 20:13:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x6e0]}) 20:13:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd45daa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:38 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:38 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) [ 2056.631087][ T26] audit: type=1800 audit(1563999218.332:456): pid=24591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17457 res=0 20:13:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:38 executing program 1: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) quotactl(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 20:13:38 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) [ 2056.941555][T24600] XFS (loop2): bad version [ 2056.947488][T24600] XFS (loop2): SB validate failed with error -22. 20:13:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='ipddp0\x00'}) gettid() timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000000200)) 20:13:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:39 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:39 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) 20:13:39 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001700)={'dummy0\x00', &(0x7f00000016c0)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, '6$8'}}) [ 2057.723399][ T26] audit: type=1800 audit(1563999219.422:457): pid=24748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16535 res=0 20:13:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b7094116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:39 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) 20:13:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001680)='projid_map\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 20:13:39 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) 20:13:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:39 executing program 5: userfaultfd(0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) 20:13:39 executing program 1: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f0000000000), 0x7f6) ftruncate(r0, 0xc) [ 2058.264907][ T8813] XFS (loop2): bad version [ 2058.289395][T24766] XFS (loop2): SB validate failed with error -22. 20:13:40 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:40 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:40 executing program 5: userfaultfd(0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) [ 2058.928351][ T26] audit: type=1800 audit(1563999220.632:458): pid=24925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17693 res=0 20:13:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c413bf851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), 0x4) 20:13:40 executing program 5: userfaultfd(0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) [ 2059.117537][T25013] sctp: [Deprecated]: syz-executor.1 (pid 25013) Use of int in max_burst socket option deprecated. [ 2059.117537][T25013] Use struct sctp_assoc_value instead 20:13:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:41 executing program 5: r0 = userfaultfd(0x0) readv(r0, 0x0, 0x0) 20:13:41 executing program 1: setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000), 0x0) pkey_alloc(0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 2059.356590][T25017] XFS (loop2): bad version [ 2059.370323][T25017] XFS (loop2): SB validate failed with error -22. 20:13:41 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:41 executing program 5: r0 = userfaultfd(0x0) readv(r0, 0x0, 0x0) 20:13:41 executing program 5: r0 = userfaultfd(0x0) readv(r0, 0x0, 0x0) 20:13:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:41 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2060.062003][ T26] audit: type=1800 audit(1563999221.762:459): pid=25154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17377 res=0 20:13:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c415df851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:41 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000), 0x0) 20:13:42 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:42 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000), 0x0) [ 2060.501459][T25240] XFS (loop2): bad version [ 2060.507900][T25240] XFS (loop2): SB validate failed with error -22. 20:13:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:42 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000), 0x0) 20:13:43 executing program 1: setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000), 0x0) pkey_alloc(0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 20:13:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:43 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) 20:13:43 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:43 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f85da4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:43 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) [ 2061.843439][ T26] audit: type=1800 audit(1563999223.542:460): pid=25305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17711 res=0 20:13:43 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) [ 2061.991480][T30452] XFS (loop2): bad version [ 2062.000333][T25312] XFS (loop2): SB validate failed with error -22. 20:13:43 executing program 5: r0 = userfaultfd(0x0) readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) 20:13:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x48]}) 20:13:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:44 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:45 executing program 1: 20:13:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd75decb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:45 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0xfeffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:45 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:45 executing program 5: 20:13:45 executing program 5: 20:13:45 executing program 1: [ 2063.493855][ T26] audit: type=1800 audit(1563999225.192:461): pid=25469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17731 res=0 [ 2063.536581][ T8813] XFS (loop2): bad version [ 2063.543908][T25463] XFS (loop2): SB validate failed with error -22. 20:13:45 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:45 executing program 5: 20:13:45 executing program 1: socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000640)=[{&(0x7f0000000080)=""/123, 0x7b}], 0x1, &(0x7f0000000780)=[{&(0x7f0000000700)=""/76, 0x4c}], 0x1, 0x0) 20:13:45 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:45 executing program 5: 20:13:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db1a33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:46 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:46 executing program 5: 20:13:46 executing program 1: 20:13:46 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:46 executing program 1: 20:13:46 executing program 5: [ 2064.589536][ T26] audit: type=1800 audit(1563999226.292:462): pid=25520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17730 res=0 [ 2064.626320][T25512] XFS (loop2): bad version [ 2064.633308][T25512] XFS (loop2): SB validate failed with error -22. 20:13:46 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:46 executing program 1: 20:13:46 executing program 5: 20:13:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3433db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:47 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:47 executing program 1: 20:13:47 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:47 executing program 5: 20:13:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:47 executing program 5: 20:13:47 executing program 1: [ 2065.618554][ T26] audit: type=1800 audit(1563999227.322:463): pid=25562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16624 res=0 20:13:47 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) [ 2065.722549][T25560] XFS (loop2): bad version [ 2065.733472][T25560] XFS (loop2): SB validate failed with error -22. 20:13:47 executing program 5: 20:13:47 executing program 1: 20:13:47 executing program 5: 20:13:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3733db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:48 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:48 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:48 executing program 1: 20:13:48 executing program 5: 20:13:48 executing program 5: 20:13:48 executing program 1: [ 2066.661529][ T26] audit: type=1800 audit(1563999228.362:464): pid=25708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16557 res=0 20:13:48 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) [ 2066.767098][T25705] XFS (loop2): bad version [ 2066.771924][T25705] XFS (loop2): SB validate failed with error -22. 20:13:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:48 executing program 5: 20:13:48 executing program 1: 20:13:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3e33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:49 executing program 1: 20:13:49 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:49 executing program 5: 20:13:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:49 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:49 executing program 5: 20:13:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:49 executing program 1: [ 2067.638409][ T26] audit: type=1800 audit(1563999229.342:465): pid=25748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17770 res=0 20:13:49 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:49 executing program 5: [ 2067.932615][T25761] XFS (loop2): bad version [ 2067.941814][T25761] XFS (loop2): SB validate failed with error -22. 20:13:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2068.402147][T30452] XFS (loop2): bad version [ 2068.415908][T25761] XFS (loop2): SB validate failed with error -22. 20:13:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f07db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:50 executing program 1: 20:13:50 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(r0) 20:13:50 executing program 5: 20:13:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:50 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:50 executing program 5: 20:13:50 executing program 1: 20:13:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:50 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) close(r0) [ 2068.857451][ T26] audit: type=1800 audit(1563999230.562:466): pid=25799 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17778 res=0 20:13:50 executing program 5: 20:13:50 executing program 1: [ 2069.182279][ T8813] XFS (loop2): bad version [ 2069.190572][T25812] XFS (loop2): SB validate failed with error -22. [ 2069.624746][T30452] XFS (loop2): bad version [ 2069.630117][T25812] XFS (loop2): SB validate failed with error -22. 20:13:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f09db8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:13:51 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) close(r0) 20:13:51 executing program 5: 20:13:51 executing program 1: 20:13:51 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:51 executing program 1: 20:13:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:51 executing program 5: [ 2070.070958][ T26] audit: type=1800 audit(1563999231.772:467): pid=25848 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17783 res=0 20:13:51 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, 0x0, 0x0) close(r0) 20:13:52 executing program 1: [ 2070.283956][T25854] XFS (loop2): bad version [ 2070.293774][T25854] XFS (loop2): SB validate failed with error -22. 20:13:52 executing program 5: 20:13:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f0adb8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:52 executing program 1: 20:13:52 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[], 0x0) close(r0) 20:13:52 executing program 5: 20:13:52 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:52 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[], 0x0) close(r0) 20:13:52 executing program 1: 20:13:52 executing program 5: 20:13:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2071.050137][T25890] XFS (loop2): bad version [ 2071.068318][T25890] XFS (loop2): SB validate failed with error -22. 20:13:52 executing program 1: 20:13:52 executing program 5: [ 2071.269599][ T26] audit: type=1800 audit(1563999232.972:468): pid=25909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17770 res=0 20:13:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f3bdb8d3007e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:53 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[], 0x0) close(r0) 20:13:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:53 executing program 5: 20:13:53 executing program 1: [ 2072.169687][T25935] XFS (loop2): bad version [ 2072.177757][T25935] XFS (loop2): SB validate failed with error -22. 20:13:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:53 executing program 1: 20:13:53 executing program 5: 20:13:53 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) close(r0) 20:13:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:54 executing program 5: 20:13:54 executing program 1: [ 2072.446077][ T26] audit: type=1800 audit(1563999234.152:469): pid=25968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17777 res=0 20:13:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0207e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:54 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) close(r0) 20:13:54 executing program 5: 20:13:54 executing program 1: 20:13:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2073.109555][T26077] XFS (loop2): bad version [ 2073.124662][T26077] XFS (loop2): SB validate failed with error -22. 20:13:54 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:54 executing program 5: 20:13:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:54 executing program 1: 20:13:54 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) close(r0) 20:13:55 executing program 5: 20:13:55 executing program 1: [ 2073.468230][ T26] audit: type=1800 audit(1563999235.172:470): pid=26099 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16624 res=0 20:13:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0307e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:55 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(0xffffffffffffffff) 20:13:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:55 executing program 1: 20:13:55 executing program 5: [ 2074.232304][T30452] XFS (loop2): bad version [ 2074.237883][T26125] XFS (loop2): SB validate failed with error -22. 20:13:56 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:56 executing program 5: 20:13:56 executing program 1: 20:13:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:56 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(0xffffffffffffffff) 20:13:56 executing program 1: 20:13:56 executing program 5: [ 2074.526961][ T26] audit: type=1800 audit(1563999236.232:471): pid=26144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17799 res=0 20:13:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0407e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:56 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTATu(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="8d"], 0x1) close(0xffffffffffffffff) 20:13:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:56 executing program 1: 20:13:56 executing program 5: [ 2075.122870][T26166] XFS (loop2): bad version [ 2075.149621][T26166] XFS (loop2): SB validate failed with error -22. 20:13:57 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:57 executing program 5: 20:13:57 executing program 1: 20:13:57 executing program 4: 20:13:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:57 executing program 1: 20:13:57 executing program 5: [ 2075.605895][ T26] audit: type=1800 audit(1563999237.312:472): pid=26187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17813 res=0 20:13:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0507e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:57 executing program 4: 20:13:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:13:57 executing program 5: 20:13:57 executing program 1: [ 2076.186574][T26210] XFS (loop2): bad version [ 2076.191298][T26210] XFS (loop2): SB validate failed with error -22. 20:13:58 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:58 executing program 4: 20:13:58 executing program 1: 20:13:58 executing program 5: 20:13:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:13:58 executing program 4: 20:13:58 executing program 5: [ 2076.545616][ T26] audit: type=1800 audit(1563999238.252:473): pid=26230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17822 res=0 20:13:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0607e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:58 executing program 1: 20:13:58 executing program 4: 20:13:58 executing program 5: 20:13:58 executing program 0: [ 2077.202263][T26251] XFS (loop2): bad version [ 2077.207912][T26251] XFS (loop2): SB validate failed with error -22. 20:13:59 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:13:59 executing program 4: 20:13:59 executing program 1: 20:13:59 executing program 5: 20:13:59 executing program 0: 20:13:59 executing program 4: 20:13:59 executing program 1: [ 2077.503249][ T26] audit: type=1800 audit(1563999239.202:474): pid=26270 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16546 res=0 20:13:59 executing program 0: 20:13:59 executing program 5: 20:13:59 executing program 4: 20:13:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0707e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:13:59 executing program 1: [ 2078.140148][T26293] XFS (loop2): bad version [ 2078.145428][T26293] XFS (loop2): SB validate failed with error -22. 20:14:00 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:00 executing program 0: 20:14:00 executing program 1: 20:14:00 executing program 4: 20:14:00 executing program 5: 20:14:00 executing program 5: 20:14:00 executing program 0: 20:14:00 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = userfaultfd(0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = dup2(r0, r4) dup3(r5, r1, 0x0) [ 2078.479598][ T26] audit: type=1800 audit(1563999240.182:475): pid=26311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16546 res=0 20:14:00 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) 20:14:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0807e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:00 executing program 0: migrate_pages(0x0, 0x7, &(0x7f00000001c0)=0x18003, &(0x7f0000000100)=0x41) [ 2079.035096][T26384] XFS (loop2): bad version [ 2079.039865][T26384] XFS (loop2): SB validate failed with error -22. 20:14:01 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:01 executing program 5: 20:14:01 executing program 0: 20:14:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x9}, 0x8, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'memory'}]}, 0x12) close(0xffffffffffffffff) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 20:14:01 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x0) [ 2079.518721][ T26] audit: type=1800 audit(1563999241.222:476): pid=26463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16686 res=0 20:14:01 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0907e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:01 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=""/3, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7}, 0x8, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 20:14:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x9}, 0x8, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'memory'}]}, 0x12) close(0xffffffffffffffff) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) [ 2080.038637][T30452] XFS (loop2): bad version [ 2080.043993][T26623] XFS (loop2): SB validate failed with error -22. 20:14:02 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:02 executing program 5: r0 = socket$inet(0x10, 0x1000000000000003, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000001c0)="240000002a0007031dfffd946fa2830020200a0009000000000000000004000000000000280000001100ffffba16a0aa1c0009e3966cf055d90f15a322e029eee7f817c37218fea642ef6b2c", 0x4c}], 0x1}, 0x0) 20:14:02 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) 20:14:02 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4, 0xffffffffffffff71}, {0x99e1, 0xffff}]}, 0x14, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = gettid() ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000400)=""/221) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3b) [ 2080.491669][T26814] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:14:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x9}, 0x8, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'memory'}]}, 0x12) close(0xffffffffffffffff) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) [ 2080.627248][ T26] audit: type=1800 audit(1563999242.332:477): pid=26838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16523 res=0 20:14:02 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0a07e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:02 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) 20:14:02 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:02 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x400000100002f, {0x0, 0x0, 0x1ff}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 20:14:02 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) [ 2081.106081][T26939] XFS (loop2): bad version [ 2081.121166][T26939] XFS (loop2): SB validate failed with error -22. 20:14:03 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2081.372301][T26956] input: syz0 as /devices/virtual/input/input373 20:14:03 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:03 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xa) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = accept$alg(r2, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x400000042000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r3, &(0x7f0000005b80)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/207, 0xcf}], 0x1}}], 0x1, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) write$FUSE_OPEN(r0, 0x0, 0x0) 20:14:03 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3b) 20:14:03 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:03 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42802, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7}, 0x7) close(r0) 20:14:03 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3b) [ 2081.782367][ T26] audit: type=1800 audit(1563999243.482:478): pid=27080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17025 res=0 20:14:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d0b07e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:03 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3b) 20:14:03 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:03 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xa) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = accept$alg(r2, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x400000042000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r3, &(0x7f0000005b80)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/207, 0xcf}], 0x1}}], 0x1, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) write$FUSE_OPEN(r0, 0x0, 0x0) 20:14:03 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2082.248991][T27198] XFS (loop2): bad version [ 2082.253828][T27198] XFS (loop2): SB validate failed with error -22. 20:14:04 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:04 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) 20:14:04 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:04 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2082.864932][T27334] XFS (loop4): Invalid device [./file0], error=-15 [ 2082.891173][ T26] audit: type=1800 audit(1563999244.592:479): pid=27342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17025 res=0 20:14:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x8001) r2 = syz_open_pts(r1, 0x4000000000000005) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x197b}) write(r1, &(0x7f0000c34fff), 0xffffff0b) write$P9_RATTACH(r3, 0x0, 0x0) 20:14:05 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d2307e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:05 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:05 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 20:14:05 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:05 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2083.470015][T27357] XFS (loop2): bad version [ 2083.475157][T27357] XFS (loop2): SB validate failed with error -22. 20:14:05 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:05 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:05 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:05 executing program 0: clone(0x802102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000000004, 0x231, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 20:14:05 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d2507e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:05 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2084.066135][ T26] audit: type=1800 audit(1563999245.772:480): pid=27543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16635 res=0 20:14:06 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:06 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2084.293322][T27582] XFS (loop2): bad version [ 2084.300378][T27582] XFS (loop2): SB validate failed with error -22. [ 2084.491820][ T26] audit: type=1800 audit(1563999246.192:481): pid=27364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17249 res=0 20:14:06 executing program 4: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2cca0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e000000370000000000000000000000f7"], 0x11) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:06 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:06 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:06 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:06 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:06 executing program 4: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() read(r0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) tkill(r1, 0x6) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) 20:14:06 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000000004, 0x231, 0xffffffffffffffff, 0x0) capset(&(0x7f00000001c0), 0x0) 20:14:06 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2085.013988][T27745] cgroup: fork rejected by pids controller in /syz1 20:14:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d2b07e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:06 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:06 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2085.251764][ T26] audit: type=1800 audit(1563999246.952:482): pid=27838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16668 res=0 20:14:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) epoll_wait(r1, &(0x7f00000000c0)=[{}], 0x1, 0x81) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) 20:14:07 executing program 4: 20:14:07 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:07 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) [ 2085.517395][T27869] XFS (loop2): bad version [ 2085.539149][T27869] XFS (loop2): SB validate failed with error -22. 20:14:07 executing program 4: 20:14:07 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:07 executing program 4: 20:14:07 executing program 0: 20:14:07 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d2d07e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:08 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff3b}, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x0, 0xb06}, 0x14}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 20:14:08 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:08 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2086.530973][ T26] audit: type=1800 audit(1563999248.232:483): pid=28118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16993 res=0 [ 2086.531004][T30452] XFS (loop2): bad version 20:14:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2086.662664][T28114] XFS (loop2): SB validate failed with error -22. 20:14:08 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:09 executing program 5: syz_open_dev$vcsn(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) 20:14:09 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:09 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3b07e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:09 executing program 5: syz_open_dev$vcsn(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:09 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:09 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2087.527614][ T26] audit: type=1800 audit(1563999249.222:484): pid=28375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17633 res=0 [ 2087.638249][T28366] XFS (loop2): bad version [ 2087.643001][T28366] XFS (loop2): SB validate failed with error -22. 20:14:09 executing program 5: syz_open_dev$vcsn(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:09 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:09 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:10 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:10 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000000240)="19", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0x36) 20:14:10 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d5c07e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:10 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:10 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:10 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2088.551044][T28516] XFS (loop2): bad version [ 2088.558677][T28516] XFS (loop2): SB validate failed with error -22. 20:14:10 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2088.587926][ T26] audit: type=1800 audit(1563999250.292:485): pid=28529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16688 res=0 20:14:10 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:10 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:10 executing program 0: 20:14:11 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:11 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:11 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3002e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:11 executing program 0: 20:14:11 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:11 executing program 0: 20:14:11 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:11 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) [ 2089.638502][T28769] XFS (loop2): bad version [ 2089.643038][T28769] XFS (loop2): SB validate failed with error -22. 20:14:11 executing program 0: [ 2089.735452][ T26] audit: type=1800 audit(1563999251.422:486): pid=28798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17824 res=0 20:14:11 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:11 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:12 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:12 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x801, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x7a, 0x0, &(0x7f0000000100)) 20:14:12 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3003e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:12 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(0x0, 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:12 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:12 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:12 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) fsopen(&(0x7f0000000280)='hugetlbfs\x00', 0x0) 20:14:12 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(0x0, 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2090.715843][ T26] audit: type=1800 audit(1563999252.422:487): pid=29033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17827 res=0 [ 2090.718172][T29022] XFS (loop2): bad version [ 2090.764600][T29022] XFS (loop2): SB validate failed with error -22. 20:14:12 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:13 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:13 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:13 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(0x0, 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:13 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3004e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:13 executing program 0: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/58) 20:14:13 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:13 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0x36) [ 2091.762317][ T26] audit: type=1800 audit(1563999253.462:488): pid=29183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17827 res=0 20:14:13 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2091.871203][T29179] XFS (loop2): bad version [ 2091.876303][T29179] XFS (loop2): SB validate failed with error -22. 20:14:13 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:13 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:14 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x1}}) 20:14:14 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:14 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x5) sendmmsg$inet_sctp(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x10, 0x0}], 0x1, 0x40800) 20:14:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3005e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:14 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x801, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x4) 20:14:14 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 20:14:14 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2092.806959][ T26] audit: type=1800 audit(1563999254.512:489): pid=29332 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17827 res=0 [ 2092.938304][T29333] XFS (loop2): bad version [ 2092.942922][T29333] XFS (loop2): SB validate failed with error -22. 20:14:14 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2093.007257][T29352] sctp: [Deprecated]: syz-executor.0 (pid 29352) Use of int in max_burst socket option. [ 2093.007257][T29352] Use struct sctp_assoc_value instead 20:14:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) 20:14:15 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:15 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:15 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 20:14:15 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:15 executing program 0: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x7, {0x8001, 0x5}}) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f00000000c0)) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 20:14:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3006e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:15 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:15 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 20:14:15 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2093.811076][ T26] audit: type=1800 audit(1563999255.512:490): pid=29448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16554 res=0 20:14:15 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x1) 20:14:15 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 20:14:15 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2094.224719][T26912] XFS (loop2): bad version [ 2094.238484][T29506] XFS (loop2): SB validate failed with error -22. 20:14:16 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x6, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000500)}}, &(0x7f00000005c0)) open$dir(0x0, 0x400, 0x40) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) tkill(0x0, 0x3b) 20:14:16 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) 20:14:16 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:16 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:16 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2094.652224][T26912] XFS (loop2): bad version [ 2094.657631][T29506] XFS (loop2): SB validate failed with error -22. [ 2094.846611][ T26] audit: type=1800 audit(1563999256.552:491): pid=29551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17860 res=0 20:14:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d300ae7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:16 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) 20:14:16 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:16 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:16 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) 20:14:16 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:17 executing program 0: getcwd(0x0, 0xffffffffffffff4d) 20:14:17 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2095.362756][T29761] XFS (loop2): bad version [ 2095.374352][T29761] XFS (loop2): SB validate failed with error -22. 20:14:17 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) 20:14:17 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)) 20:14:17 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2095.937452][ T26] audit: type=1800 audit(1563999257.642:492): pid=29798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16569 res=0 20:14:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3010e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:17 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) 20:14:17 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002702000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d640500000000004504000000ffffffb5040000000040005704000010000020620700fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 20:14:17 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:18 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb3, &(0x7f0000000040)) [ 2096.386576][T29820] XFS (loop2): bad version [ 2096.396490][T29820] XFS (loop2): SB validate failed with error -22. 20:14:18 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb3, &(0x7f0000000040)) 20:14:18 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 20:14:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:18 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3011e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:18 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:14:18 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x0, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:18 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/syronet`c\xad\x06tp\x00', 0x2, 0x0) 20:14:18 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x0, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:18 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0x0, 0x0) [ 2097.261833][ T26] audit: type=1800 audit(1563999258.962:493): pid=30051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16662 res=0 20:14:19 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x0, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2097.333669][T30044] XFS (loop2): bad version [ 2097.340929][T30044] XFS (loop2): SB validate failed with error -22. 20:14:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') 20:14:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)={0x0, {{0x2, 0x0, @rand_addr=0x10000}}, 0x1}, 0x90) 20:14:19 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:19 executing program 0: socket(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x0) 20:14:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000480)="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", 0xfdef}], 0x1) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) unshare(0x24020400) 20:14:19 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3014e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:19 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:19 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 2098.311425][ T26] audit: type=1800 audit(1563999260.012:494): pid=30332 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16582 res=0 20:14:20 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000100)=r0, 0x3) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2098.546307][T30334] XFS (loop2): bad version [ 2098.557170][T30334] XFS (loop2): SB validate failed with error -22. 20:14:20 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:20 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) 20:14:21 executing program 0: openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0xa0001, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@initdev, @remote, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000300)) 20:14:21 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:21 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2099.455460][ T26] audit: type=1800 audit(1563999261.162:495): pid=30660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16553 res=0 20:14:21 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x7, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 20:14:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x801, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x72, 0x0, &(0x7f0000000100)) 20:14:21 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3030e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(0x0, 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:21 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000001c0)=0x7fffffffff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x10000004e20}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xffffffffffffff06) 20:14:21 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) [ 2100.171231][T30874] XFS (loop2): bad version [ 2100.176355][T30874] XFS (loop2): SB validate failed with error -22. 20:14:22 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x801, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x24, &(0x7f0000000080), 0x8) [ 2100.552755][ T26] audit: type=1800 audit(1563999262.252:496): pid=31094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16550 res=0 20:14:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d303be7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 20:14:22 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(0x0, 0x400, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4, 0xffffffffffffff71}, {0x99e1, 0xffff}]}, 0x14, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockname$inet6(r1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = gettid() ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000400)=""/221) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) 20:14:22 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:22 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) [ 2101.095015][T30452] XFS (loop2): bad version [ 2101.103941][T31225] XFS (loop2): SB validate failed with error -22. [ 2101.168399][T31224] device nr0 entered promiscuous mode 20:14:22 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:23 executing program 4: r0 = semget$private(0x0, 0x7, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000140)=""/58) 20:14:23 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:23 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3041e7473626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:23 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') [ 2101.620725][ T26] audit: type=1800 audit(1563999263.322:497): pid=31358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16554 res=0 20:14:23 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2101.944607][ T8558] XFS (loop2): bad version [ 2101.964524][T31362] XFS (loop2): SB validate failed with error -22. 20:14:23 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/49, 0x31}], 0x1) 20:14:24 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140), 0x0, 0x0) 20:14:24 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:24 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:24 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e75c3626810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:24 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:24 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:24 executing program 0: poll(&(0x7f0000000240)=[{}], 0x1, 0x800000000004c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) poll(&(0x7f0000000000), 0x1, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x100000078, 0x0, 0x0, 0x800e00515) r2 = dup(r1) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xeaab, 0x2, 0x0, 0x800e0050e) shutdown(r2, 0x0) [ 2102.732085][ T26] audit: type=1800 audit(1563999264.432:498): pid=31707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16571 res=0 20:14:24 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:24 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') [ 2102.915781][T31716] XFS (loop2): bad version [ 2102.920322][T31716] XFS (loop2): SB validate failed with error -22. 20:14:24 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:24 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140), 0x0, 0x0) 20:14:24 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x42) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}, {&(0x7f00000001c0)=""/8, 0x8}], 0x2}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r6, &(0x7f0000000640)=[{&(0x7f0000000780)=""/56, 0x38}, {0x0}], 0x2) shutdown(r5, 0x0) shutdown(r2, 0x0) 20:14:25 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:25 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:25 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:25 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7470a26810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:25 executing program 0: poll(&(0x7f0000000240)=[{}], 0x1, 0x800000000004c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) poll(&(0x7f0000000000), 0x1, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x100000078, 0x0, 0x0, 0x800e00515) r2 = dup(r1) socketpair(0x17, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xe8e4, 0x2, 0x0, 0x800e0050e) shutdown(r2, 0x0) [ 2103.762005][ T26] audit: type=1800 audit(1563999265.462:499): pid=31972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16551 res=0 [ 2103.801280][ T8558] XFS (loop2): bad version 20:14:25 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) unlink(&(0x7f00000000c0)='./file0\x00') [ 2103.808942][T31964] XFS (loop2): SB validate failed with error -22. 20:14:25 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:25 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:25 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x4000000000000003, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x19, &(0x7f00000002c0), 0x0, &(0x7f0000000140), 0x0, 0x0) 20:14:25 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffea2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/188, 0xbc}, {0x0}, {0x0, 0x18f}, {0x0, 0xa6}, {0x0}], 0x390}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/185, 0xb9}], 0x1}, 0x2) shutdown(r1, 0x0) lseek(r0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x20e6d29dfb76313f, 0x20002, 0x0, 0x800e0050e) shutdown(r2, 0x0) 20:14:26 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7472326810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:26 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:26 executing program 0: poll(&(0x7f0000000240)=[{}], 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000), 0x1, 0x40) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x100000078, 0x0, 0x0, 0x800e00515) r1 = dup(r0) setsockopt$inet_buf(r0, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xe8e4, 0x2, 0x0, 0x800e0050e) shutdown(r1, 0x0) 20:14:26 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:26 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:26 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:26 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2104.868866][T32234] XFS (loop2): bad version [ 2104.872627][ T26] audit: type=1800 audit(1563999266.572:500): pid=32281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16716 res=0 [ 2104.873722][T32234] XFS (loop2): SB validate failed with error -22. 20:14:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x3) 20:14:26 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:26 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:27 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7472b26810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:27 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2105.521800][T32380] debugfs: Directory 'vcpu0' with parent '32380-5' already present! 20:14:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:27 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:27 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:27 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf77, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 2105.894160][ T8558] XFS (loop2): bad version [ 2105.910264][T32514] XFS (loop2): SB validate failed with error -22. 20:14:27 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') [ 2106.048613][ T26] audit: type=1800 audit(1563999267.752:501): pid=32613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16554 res=0 [ 2106.059657][T32568] debugfs: Directory 'vcpu0' with parent '32568-5' already present! 20:14:27 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2106.182485][ T26] audit: type=1804 audit(1563999267.882:502): pid=32622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir534032898/syzkaller.ZdD1J9/4018/file0" dev="sda1" ino=16677 res=1 20:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:28 executing program 4: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:28 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:28 executing program 4: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7472d26810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2106.750825][T32642] debugfs: Directory 'vcpu0' with parent '32642-5' already present! 20:14:28 executing program 4: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:28 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000400)='nv\x00', 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0xfffffffffffffe30) syz_genetlink_get_family_id$tipc2(0x0) socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x2, 0x0, 0x1a) 20:14:28 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2107.027958][T32751] XFS (loop2): bad version [ 2107.040827][T32751] XFS (loop2): SB validate failed with error -22. [ 2107.182978][ T26] audit: type=1800 audit(1563999268.882:503): pid=319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16728 res=0 20:14:28 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:29 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2107.304425][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2107.396948][ T325] debugfs: Directory 'vcpu0' with parent '325-5' already present! 20:14:29 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:29 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) stat(0x0, 0x0) getresuid(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x8dffffff, 0x0, 0x0) 20:14:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473026810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:29 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:29 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:29 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:29 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2108.208148][ T508] XFS (loop2): bad version [ 2108.218059][ T508] XFS (loop2): SB validate failed with error -22. 20:14:30 executing program 0: r0 = socket$inet(0x10, 0x1000000000000003, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000001c0)="240000002a0007031dfffd946fa2830020200a0009000000000000000004000000000000", 0x24}], 0x1}, 0x0) [ 2108.335688][ T26] audit: type=1800 audit(1563999270.042:504): pid=597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16699 res=0 20:14:30 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, 0x0, 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:30 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:30 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0xac, 0x0) 20:14:30 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, 0x0, 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473426810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:14:30 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:30 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, 0x0, 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:30 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 2109.277224][ T641] XFS (loop2): bad version [ 2109.284806][ T641] XFS (loop2): SB validate failed with error -22. [ 2109.443576][ T26] audit: type=1800 audit(1563999271.142:505): pid=658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16735 res=0 20:14:31 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:31 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:14:31 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:31 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 20:14:31 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473b26810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:31 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:32 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:32 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 20:14:32 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') [ 2110.375579][ T802] XFS (loop2): bad version [ 2110.388420][ T802] XFS (loop2): SB validate failed with error -22. 20:14:32 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2110.578905][ T26] audit: type=1800 audit(1563999272.282:506): pid=874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16748 res=0 20:14:32 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:32 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:32 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2111.207492][ T1050] debugfs: Directory 'vcpu0' with parent '1050-5' already present! 20:14:33 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7475c26810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:33 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) close(r0) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:33 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:33 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:14:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:14:33 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:33 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') [ 2111.630476][ T26] audit: type=1800 audit(1563999273.332:507): pid=1094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16535 res=0 [ 2111.655435][ T1084] XFS (loop2): bad version [ 2111.664617][ T1084] XFS (loop2): SB validate failed with error -22. 20:14:33 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:33 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:14:34 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:34 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') 20:14:34 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e747363b810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:34 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2112.560256][ T1138] XFS (loop2): bad version [ 2112.571580][ T1138] XFS (loop2): SB validate failed with error -22. 20:14:34 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:34 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') [ 2112.600025][ T26] audit: type=1800 audit(1563999274.302:508): pid=1151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16758 res=0 20:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:34 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(0x0) 20:14:34 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:35 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:35 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e747365d810d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:35 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(0x0) 20:14:35 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:35 executing program 4: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x1) close(r0) unlink(0x0) [ 2113.604864][ T26] audit: type=1800 audit(1563999275.302:509): pid=1314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16538 res=0 [ 2113.617109][ T1305] debugfs: Directory 'vcpu0' with parent '1305-5' already present! 20:14:35 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:35 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2113.653405][ T1302] XFS (loop2): bad version [ 2113.667487][ T1302] XFS (loop2): SB validate failed with error -22. 20:14:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:35 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) 20:14:35 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2114.080923][ T1336] debugfs: Directory 'vcpu0' with parent '1336-5' already present! 20:14:36 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:36 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) 20:14:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e747362681043d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:36 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2114.583943][ T1370] debugfs: Directory 'vcpu0' with parent '1370-5' already present! 20:14:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) write$binfmt_elf64(r0, &(0x7f0000000a40)=ANY=[@ANYRES64], 0x8) close(r0) [ 2114.687873][ T8558] XFS (loop2): bad version [ 2114.693070][ T1376] XFS (loop2): SB validate failed with error -22. [ 2114.748669][ T26] audit: type=1800 audit(1563999276.452:510): pid=1388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16811 res=0 20:14:36 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:36 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2115.093308][ T1405] debugfs: Directory 'vcpu0' with parent '1405-4' already present! 20:14:37 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0x5}]}, 0x30}}, 0x0) 20:14:37 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e747362681053d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:37 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2115.653469][ T1546] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:37 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2115.705690][ T1548] debugfs: Directory 'vcpu0' with parent '1548-4' already present! [ 2115.720199][ T1546] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 20:14:37 executing program 4: socket(0x11, 0x1, 0x9) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) socket(0x0, 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab08) [ 2115.798805][ T26] audit: type=1800 audit(1563999277.502:511): pid=1585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16779 res=0 [ 2115.828222][T26912] XFS (loop2): bad version [ 2115.840786][ T1544] XFS (loop2): SB validate failed with error -22. 20:14:37 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:37 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2116.131487][ T1674] debugfs: Directory 'vcpu0' with parent '1674-4' already present! 20:14:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:38 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:38 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810c3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:38 executing program 4: socket(0x11, 0x1, 0x9) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) socket(0x0, 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab08) 20:14:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2116.761814][ T1820] debugfs: Directory 'vcpu0' with parent '1820-5' already present! 20:14:38 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2116.857311][ T8558] XFS (loop2): bad version [ 2116.865549][ T1826] XFS (loop2): SB validate failed with error -22. [ 2116.886554][ T26] audit: type=1800 audit(1563999278.572:512): pid=1855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16833 res=0 20:14:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:38 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r2, 0x0, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x4, r2}) [ 2117.305852][ T1953] debugfs: Directory 'vcpu0' with parent '1953-5' already present! 20:14:39 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:39 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e747362681103d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:39 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:39 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x3b) 20:14:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r2, 0x0, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x4, r2}) [ 2117.889700][ T2181] debugfs: Directory 'vcpu0' with parent '2181-5' already present! [ 2117.915872][ T26] audit: type=1800 audit(1563999279.622:513): pid=2186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16816 res=0 20:14:39 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x3b) [ 2118.073517][ T2194] XFS (loop2): bad version [ 2118.078356][ T2194] XFS (loop2): SB validate failed with error -22. 20:14:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:40 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:40 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x3b) [ 2118.452744][ T2325] debugfs: Directory 'vcpu0' with parent '2325-5' already present! 20:14:40 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:40 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:40 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x3b) 20:14:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e747362681123d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r2, 0x0, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x4, r2}) [ 2118.947115][ T2442] debugfs: Directory 'vcpu0' with parent '2442-5' already present! 20:14:40 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:40 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x3b) [ 2119.086562][ T26] audit: type=1800 audit(1563999280.792:514): pid=2502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16775 res=0 [ 2119.222229][ T2534] XFS (loop2): bad version [ 2119.243618][ T2534] XFS (loop2): SB validate failed with error -22. 20:14:41 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:41 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x3b) 20:14:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r2, 0x0, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x4, r2}) 20:14:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e747362681143d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:41 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2119.711135][ T2708] debugfs: Directory 'vcpu0' with parent '2708-5' already present! [ 2119.976472][ T2717] XFS (loop2): bad version [ 2119.995514][ T2717] XFS (loop2): SB validate failed with error -22. 20:14:41 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:41 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x3b) 20:14:41 executing program 0: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2120.270298][ T2848] debugfs: Directory 'vcpu0' with parent '2826-5' already present! 20:14:42 executing program 0: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:42 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ppoll(&(0x7f0000000080)=[{r1, 0x400}, {r1, 0x1000}, {r0}, {r0}, {r1, 0x4000}, {r0}], 0x6, &(0x7f0000000100), &(0x7f0000000180), 0x8) [ 2120.334982][ T26] audit: type=1800 audit(1563999282.042:515): pid=2851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16838 res=0 20:14:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626813b3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:42 executing program 0: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:42 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x3b) [ 2120.764734][ T2967] debugfs: Directory 'vcpu0' with parent '2967-5' already present! [ 2120.909164][ T3000] XFS (loop2): bad version [ 2120.913953][ T3000] XFS (loop2): SB validate failed with error -22. 20:14:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:42 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:42 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x40004e20}, 0x1c) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x2000000]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:14:43 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) 20:14:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2121.299292][ T3192] debugfs: Directory 'vcpu0' with parent '3192-5' already present! 20:14:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626815d3d7ba59109e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2121.529002][ T26] audit: type=1800 audit(1563999283.232:516): pid=3322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16755 res=0 20:14:43 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) 20:14:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) recvmsg$kcm(r1, &(0x7f0000002e80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c040040006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) [ 2121.798029][ T3375] debugfs: Directory 'vcpu0' with parent '3375-5' already present! [ 2121.906651][ T3376] XFS (loop2): bad version [ 2121.912057][ T3376] XFS (loop2): SB validate failed with error -22. 20:14:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:43 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xe4}, {0x99e1, 0xffff}]}, 0x14, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) 20:14:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2122.341336][ T3498] debugfs: Directory 'vcpu0' with parent '3498-5' already present! 20:14:44 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:44 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0, 0x4b}, 0x5000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfffffd55) openat$cgroup_ro(r2, &(0x7f0000000480)='cpu.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x326, 0x8, 0x4, 0xfffffffffffffffb, 0x0, 0x2, 0x10080, 0x6, 0x1, 0x0, 0x7fff, 0x10001, 0x80000000, 0x1b, 0x7f, 0x5, 0x5, 0x5, 0x85e, 0x3, 0xffffffffffffff14, 0xe220, 0x8, 0x3, 0xffff, 0x54, 0x100000001, 0x7, 0x6, 0x8, 0x800, 0x100000000, 0x9, 0x5e7, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x18, 0x8}, 0x40c8, 0xd19, 0x9a4, 0x8, 0x1, 0x8, 0x8}, 0xffffffffffffffff, 0xe, r1, 0x1) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60fc, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x74c, 0x0, 0x4, 0x0, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x100000000000004d}, 0x8000) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$TUNGETDEVNETNS(r5, 0x54e3, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000380)) 20:14:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00706964732011"], 0x7) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 20:14:44 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59102e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2122.686656][ T26] audit: type=1800 audit(1563999284.392:517): pid=3535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16790 res=0 [ 2122.846824][ T3554] debugfs: Directory 'vcpu0' with parent '3554-5' already present! 20:14:44 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2122.954872][ T3614] XFS (loop2): bad version 20:14:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2122.977046][ T3614] XFS (loop2): SB validate failed with error -22. 20:14:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) 20:14:45 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:45 executing program 1: capset(&(0x7f0000000080)={0x19980330}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000480)={0x0, 0x38ea}) add_key(&(0x7f00000001c0)='cifs.idmap\x00', 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x400000000003, 0x80000000002, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2123.372381][ T3758] debugfs: Directory 'vcpu0' with parent '3758-5' already present! 20:14:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:45 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59103e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:45 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2123.829984][ T3774] debugfs: Directory 'vcpu0' with parent '3774-5' already present! [ 2123.852498][ T26] audit: type=1800 audit(1563999285.552:518): pid=3782 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16836 res=0 20:14:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2123.953367][ T3783] XFS (loop2): bad version [ 2123.960858][ T3783] XFS (loop2): SB validate failed with error -22. 20:14:45 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2124.227283][ T3797] debugfs: Directory 'vcpu0' with parent '3797-5' already present! 20:14:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:46 executing program 4: capset(&(0x7f0000000080)={0x19980330}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000480)={0x80, 0x38ea, 0x0, 0x9, 0x3, [{0x138a, 0x0, 0x71e, 0x0, 0x0, 0x80}, {0x80, 0x0, 0x7fff, 0x0, 0x0, 0x3004}, {0x0, 0x20, 0x4, 0x0, 0x0, 0xa}]}) add_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="0cfef2", 0x3, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x400000000003, 0x80000000002, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2124.703674][ T3946] debugfs: Directory 'vcpu0' with parent '3946-5' already present! 20:14:46 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59104e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2124.934405][ T26] audit: type=1800 audit(1563999286.642:519): pid=4127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16779 res=0 20:14:46 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x102) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) socket(0x200000000000011, 0x80000000000003, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x4) 20:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x571]}) [ 2125.205200][ T4227] XFS (loop2): bad version [ 2125.209974][ T4227] XFS (loop2): SB validate failed with error -22. 20:14:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2125.293308][ T4241] debugfs: Directory 'vcpu0' with parent '4241-5' already present! 20:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59105e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2125.850663][ T4383] debugfs: Directory 'vcpu0' with parent '4383-5' already present! 20:14:47 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0xc0010015]}) 20:14:47 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000200)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)='R'}) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2d', @ifru_flags}) [ 2126.055265][ T4437] XFS (loop2): bad version [ 2126.064436][ T4437] XFS (loop2): SB validate failed with error -22. 20:14:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2126.167595][ T26] audit: type=1800 audit(1563999287.872:520): pid=4477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16762 res=0 [ 2126.398137][ T4492] debugfs: Directory 'vcpu0' with parent '4492-5' already present! 20:14:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59106e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = dup2(r3, r3) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0xd, &(0x7f0000000040), 0x8) r5 = dup2(r1, r3) dup3(r5, r2, 0x0) 20:14:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x570]}) [ 2126.869381][ T4740] debugfs: Directory 'vcpu0' with parent '4740-5' already present! [ 2126.927117][ T4771] XFS (loop2): bad version 20:14:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2126.952929][ T4771] XFS (loop2): SB validate failed with error -22. 20:14:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:48 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:48 executing program 1: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) sync_file_range(r0, 0x0, 0x0, 0x2) 20:14:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2127.312469][ T26] audit: type=1800 audit(1563999289.012:521): pid=4960 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16773 res=0 20:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0xfbffffff, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 20:14:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, &(0x7f0000000080)) pkey_alloc(0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59107e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x60}}, 0x0) 20:14:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2128.112224][ T5174] XFS (loop2): bad version [ 2128.128034][ T5174] XFS (loop2): SB validate failed with error -22. 20:14:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x2, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 20:14:49 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:50 executing program 1: clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 20:14:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2128.443423][ T26] audit: type=1800 audit(1563999290.142:522): pid=5383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16762 res=0 20:14:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59108e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:14:50 executing program 1: 20:14:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x2, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 20:14:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2129.093425][T26912] XFS (loop2): bad version [ 2129.100609][ T5697] XFS (loop2): SB validate failed with error -22. 20:14:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:51 executing program 1: 20:14:51 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:51 executing program 4: 20:14:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:51 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x102) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000080)={0x5}, 0xfdaa) r2 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 2129.435564][ T5727] debugfs: Directory 'vcpu0' with parent '5727-5' already present! 20:14:51 executing program 4: socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84", 0x29}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) [ 2129.570982][ T26] audit: type=1800 audit(1563999291.272:523): pid=5738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16773 res=0 20:14:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba5910ae91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:14:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x24a9e380) [ 2130.041434][ T5803] debugfs: Directory 'vcpu0' with parent '5803-5' already present! [ 2130.110466][ T8558] XFS (loop2): bad version [ 2130.116540][ T5829] XFS (loop2): SB validate failed with error -22. 20:14:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/186, 0x24a9e380) 20:14:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x48) 20:14:52 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:14:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:14:52 executing program 4: 20:14:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba5910be91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2130.907115][ T26] audit: type=1800 audit(1563999292.612:524): pid=6046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16851 res=0 [ 2130.977388][ T6037] debugfs: Directory 'vcpu0' with parent '6037-5' already present! [ 2131.248894][ T6098] XFS (loop2): bad version [ 2131.258805][ T6098] XFS (loop2): SB validate failed with error -22. [ 2131.643503][T26912] XFS (loop2): bad version [ 2131.649003][ T6098] XFS (loop2): SB validate failed with error -22. 20:15:03 executing program 1: 20:15:03 executing program 4: 20:15:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/186, 0x24a9e380) 20:15:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:15:03 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba5910ce91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2142.061886][ T26] audit: type=1800 audit(1563999303.762:525): pid=6128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16656 res=0 [ 2142.126993][ T6129] debugfs: Directory 'vcpu0' with parent '6129-5' already present! 20:15:03 executing program 1: 20:15:03 executing program 4: [ 2142.177240][T26912] XFS (loop2): bad version [ 2142.184424][ T6131] XFS (loop2): SB validate failed with error -22. 20:15:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/186, 0x24a9e380) 20:15:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:15:04 executing program 1: 20:15:04 executing program 4: 20:15:04 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) 20:15:04 executing program 1: 20:15:04 executing program 4: [ 2142.573145][ T6155] debugfs: Directory 'vcpu0' with parent '6155-5' already present! 20:15:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2143.036037][ T6178] debugfs: Directory 'vcpu0' with parent '6178-5' already present! 20:15:04 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:04 executing program 4: 20:15:04 executing program 1: 20:15:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba5910de91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:04 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) 20:15:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:15:04 executing program 4: 20:15:04 executing program 1: [ 2143.328649][ T8558] XFS (loop2): bad version [ 2143.340694][ T6186] XFS (loop2): SB validate failed with error -22. 20:15:05 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x200000000011, r0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) 20:15:05 executing program 4: [ 2143.378554][ T6194] debugfs: Directory 'vcpu0' with parent '6194-5' already present! [ 2143.379257][ T26] audit: type=1800 audit(1563999305.082:526): pid=6202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16824 res=0 20:15:05 executing program 1: 20:15:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2143.692793][ T6218] debugfs: Directory 'vcpu0' with parent '6218-5' already present! 20:15:05 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:05 executing program 4: 20:15:05 executing program 1: 20:15:05 executing program 0: 20:15:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:15:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba5910ee91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:06 executing program 4: mlockall(0x3) shmat(0x0, &(0x7f000093a000/0x4000)=nil, 0x4000) 20:15:06 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0) 20:15:06 executing program 0: socketpair(0x0, 0x80f, 0x0, &(0x7f0000001700)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001480)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)={0x1, 0x4, [@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast, @broadcast]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001540)=r0, 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 2144.356986][ T6239] XFS (loop2): bad version [ 2144.361787][ T6239] XFS (loop2): SB validate failed with error -22. [ 2144.368430][ T26] audit: type=1800 audit(1563999306.062:527): pid=6247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16578 res=0 20:15:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2144.538959][ T6260] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 20:15:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:15:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59110e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2145.307500][T26912] XFS (loop2): bad version [ 2145.316959][ T6475] XFS (loop2): SB validate failed with error -22. 20:15:07 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:07 executing program 1: socket(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) setxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f00000002c0)='y\x00', 0x2, 0x1) prctl$PR_GET_SECCOMP(0x15) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) 20:15:07 executing program 0: socketpair(0x0, 0x80f, 0x0, &(0x7f0000001700)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001480)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)={0x1, 0x4, [@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast, @broadcast]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001540)=r0, 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 20:15:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2145.491106][ T6571] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2145.584432][ T26] audit: type=1800 audit(1563999307.282:528): pid=6611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16642 res=0 20:15:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:15:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59111e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:07 executing program 4: r0 = fsopen(&(0x7f00000000c0)='minix\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x7, 0x0, 0x0, 0x0) 20:15:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000500)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 20:15:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000080)=[{&(0x7f0000003740)=""/4096, 0x1000}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e005ee) shutdown(r0, 0x0) recvmsg(r1, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000240)=""/148, 0x94}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x2}, 0x0) shutdown(r1, 0x0) [ 2146.229366][ T6707] XFS (loop2): bad version [ 2146.236097][ T6707] XFS (loop2): SB validate failed with error -22. 20:15:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:15:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700), 0x0, &(0x7f0000004780)=""/245, 0xf5}}], 0x500, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet6_sctp(0xa, 0x0, 0x84) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:15:08 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2146.632156][ T26] audit: type=1800 audit(1563999308.332:529): pid=6870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16642 res=0 20:15:08 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000000003ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x800000000008, 0x80, 0xff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c, 0x2}, 0x3c) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 20:15:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:15:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") userfaultfd(0x7fe) 20:15:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59112e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}], 0x4}, 0x42) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}, {&(0x7f00000001c0)=""/8, 0x8}], 0x2}, 0x2) shutdown(r2, 0x0) [ 2146.954914][ T7038] debugfs: Directory 'vcpu0' with parent '7038-5' already present! 20:15:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:15:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/28, 0x1c}], 0x1) read(r0, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2147.309977][ T8558] XFS (loop2): bad version [ 2147.325873][ T7135] XFS (loop2): SB validate failed with error -22. 20:15:09 executing program 1: [ 2147.408767][ T7201] debugfs: Directory 'vcpu0' with parent '7201-5' already present! 20:15:09 executing program 0: 20:15:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:15:09 executing program 1: [ 2147.717911][ T26] audit: type=1800 audit(1563999309.422:530): pid=7339 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16627 res=0 20:15:09 executing program 0: 20:15:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x48) 20:15:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0)=0x7, 0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="a43f7a10bc918dba707335df9c4fe2e3dd545ee4c838fdcc46a7540a012dcf04a12f99172a6f3583cd5498000448f3ae533c2845496e9b0a050d5e4e05f5f8188edecc091727ed7a25a91998bf61aeec90e8718f9aa9fd5da3aa3181c0080975dee42b7d8686ca8f92f314380c2a02a90e6efeaf9d6acdb213cd260c116f495d9569a33c798d369967f6690fd59a8b3bd789702d552fe262fe738e874609724493d2f9ccd43b10486767e7d1be8518f803b96022e1f0f0de7d3720bec96ede"], 0x10098) write$binfmt_misc(r2, &(0x7f0000000000)={'syz1'}, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0x6}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 2147.982864][ T7364] debugfs: Directory 'vcpu0' with parent '7364-5' already present! 20:15:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59114e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:09 executing program 0: 20:15:09 executing program 5: 20:15:09 executing program 1: 20:15:09 executing program 0: 20:15:10 executing program 5: [ 2148.575516][ T7458] XFS (loop2): bad version [ 2148.580515][ T7458] XFS (loop2): SB validate failed with error -22. 20:15:10 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:10 executing program 1: 20:15:10 executing program 0: 20:15:10 executing program 5: 20:15:10 executing program 4: 20:15:10 executing program 0: [ 2148.910931][ T26] audit: type=1800 audit(1563999310.612:531): pid=7536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16626 res=0 20:15:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59118e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:11 executing program 5: 20:15:11 executing program 1: 20:15:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) personality(0xfffffffbfffffffc) listen(r0, 0x7d) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') stat(&(0x7f00000008c0)='./file0/file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), 0x0) getgroups(0x1, &(0x7f0000000c00)=[0xffffffffffffffff]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000180)=0x54) fstat(r3, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) geteuid() perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x101, 0x80, 0xf9, 0xd6a5, 0x9, 0x0, 0x9, 0x0, 0x7, 0x7, 0x3, 0x4000000000000, 0x6, 0x7, 0x101, 0xffffffffffffff9c, 0x3, 0x7fff, 0x7fff, 0x3ff, 0xffffffffffffffff, 0x0, 0x100000000, 0x0, 0x0, 0x1, 0x2, 0x401, 0x0, 0x101, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x861, 0xfffffffffffffff7, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@remote, @in=@local}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, 0x0) getresgid(0x0, &(0x7f0000001640), &(0x7f0000001680)) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) fstat(r0, &(0x7f0000001780)) getpid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000028c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@remote}}}, &(0x7f0000001800)=0xe8) fstat(r3, &(0x7f00000029c0)) getresuid(&(0x7f0000002ac0), &(0x7f0000002b00), &(0x7f0000002b40)) getegid() pipe(0x0) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00', 0x1302}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 20:15:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x48, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x48) 20:15:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x1a0]}) [ 2149.582318][ T7572] XFS (loop2): bad version [ 2149.597242][ T7572] XFS (loop2): SB validate failed with error -22. 20:15:11 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x400000042000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r1, &(0x7f0000005b80)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/207, 0xcf}], 0x1}}], 0x1, 0x0, 0x0) 20:15:11 executing program 0: r0 = socket(0x11, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmmsg(r0, &(0x7f0000004b00)=[{{&(0x7f0000000680)=@hci={0x1f, r1}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 20:15:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) accept(r1, 0x0, 0x0) 20:15:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) 20:15:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x80ffffff, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}]}, 0x38}}, 0x0) [ 2149.930355][ T26] audit: type=1800 audit(1563999311.632:532): pid=7812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16534 res=0 20:15:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59130e91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:11 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000008880)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) 20:15:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000300)=""/237) 20:15:12 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2d', @ifru_flags}) 20:15:12 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="d3d2b93c3889920400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe8dac0726906da58a5d1ab066f24351eda628769d37cbcb5c0c5dbc1b", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2b", @ANYRESHEX], 0x0, 0xe4}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2150.656875][ T8110] XFS (loop2): bad version [ 2150.661568][ T8110] XFS (loop2): SB validate failed with error -22. 20:15:12 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:15:12 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000003c0)) fstat(r0, 0x0) mount$fuseblk(&(0x7f0000000200)='/dev/loop0\x00', &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='fuseblk\x00', 0x200000, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1200}}, {@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}], [{@smackfshat={'smackfshat'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@obj_type={'obj_type', 0x3d, '\'system{'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000600)='./bus\x00', &(0x7f0000000640)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getpid() fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x10000101) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 20:15:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 2151.084533][ T8237] fuse: Bad value for 'subtype' [ 2151.160182][ T26] audit: type=1800 audit(1563999312.862:533): pid=8245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16890 res=0 20:15:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba5913be91722b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) 20:15:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1fffffe, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:15:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') preadv(r0, &(0x7f0000002240)=[{&(0x7f0000000200)=""/68, 0x44}], 0x1, 0x40000000004d) 20:15:13 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="a3e4c23237eec58825106c64be56", 0x0, 0xe926}, 0x28) [ 2151.820015][ T12] XFS (loop2): bad version [ 2151.829811][ T8390] XFS (loop2): SB validate failed with error -22. 20:15:13 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) sendfile(r1, r2, 0x0, 0x20000102000007) 20:15:13 executing program 4: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="2c8e0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[], 0x0, 0xd8, 0xfffffffffffffd9f, 0x4}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:15:13 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000010000000000003000000003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 2152.285133][ T26] audit: type=1800 audit(1563999313.992:534): pid=8576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16834 res=0 20:15:14 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='.Lppp0)procmd5sum/[!\x00') 20:15:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e93022b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000001c0), 0x12) 20:15:14 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') timerfd_create(0x0, 0x0) 20:15:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2152.941274][ T8979] XFS (loop2): bad version [ 2152.948341][ T8979] XFS (loop2): SB validate failed with error -22. 20:15:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:14 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f9ffffffff000000000000", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) clock_gettime(0x1, &(0x7f0000005200)) [ 2153.198677][ T9129] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 20:15:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2153.321845][ T9129] Error parsing options; rc = [-22] [ 2153.339219][ T26] audit: type=1800 audit(1563999315.042:535): pid=9177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16581 res=0 [ 2153.408540][ T9199] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 20:15:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000001c0), 0x12) [ 2153.477213][ T9199] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 20:15:15 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e93b22b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') 20:15:15 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:15 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') wait4(0x0, 0x0, 0x0, 0x0) timerfd_create(0x7, 0x0) [ 2153.909340][ T9406] XFS (loop2): bad version [ 2153.914026][ T9406] XFS (loop2): SB validate failed with error -22. 20:15:15 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2154.107377][ T9476] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2154.160290][ T9476] Error parsing options; rc = [-22] 20:15:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f00000066c0), 0xa98, 0x0, 0x0) 20:15:16 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:16 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x3}, @enum]}}, &(0x7f0000000100)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 20:15:16 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') wait4(0x0, 0x0, 0x0, 0x0) timerfd_create(0x7, 0x0) 20:15:16 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2154.514628][ T26] audit: type=1800 audit(1563999316.212:536): pid=9748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16594 res=0 20:15:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e95d22b9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:16 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:16 executing program 5: getrandom(&(0x7f00000000c0)=""/115, 0x73, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2154.800311][ T9769] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2154.938700][ T9769] Error parsing options; rc = [-22] 20:15:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2155.001836][ T9813] XFS (loop2): bad version [ 2155.026373][ T9813] XFS (loop2): SB validate failed with error -22. 20:15:16 executing program 1: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 20:15:16 executing program 5: r0 = gettid() migrate_pages(r0, 0x4, 0x0, &(0x7f0000000140)=0x3) 20:15:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2155.365553][T10087] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2155.465690][T10087] Error parsing options; rc = [-22] 20:15:17 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000300)={0x9}, 0x1) nanosleep(&(0x7f0000000200), &(0x7f00000002c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x40800, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:17 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') wait4(0x0, 0x0, 0x0, 0x0) timerfd_create(0x7, 0x0) 20:15:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e9173bb9a0b8d60636bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:17 executing program 5: 20:15:17 executing program 1: [ 2155.685411][T10101] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 20:15:17 executing program 1: [ 2155.791615][T10101] Error parsing options; rc = [-22] 20:15:17 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:17 executing program 5: 20:15:17 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') wait4(0x0, 0x0, 0x0, 0x0) timerfd_create(0x7, 0x0) [ 2155.813950][ T26] audit: type=1800 audit(1563999317.512:537): pid=10116 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16912 res=0 [ 2155.861104][T10111] XFS (loop2): bad version [ 2155.874347][T10111] XFS (loop2): SB validate failed with error -22. 20:15:17 executing program 1: 20:15:17 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2156.127349][T10132] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2156.150406][T10132] Error parsing options; rc = [-22] 20:15:18 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000040)={0x62, @empty, 0x4e23, 0x1, 'dh\x00', 0x17, 0x2f, 0x33}, 0x2c) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000180)={0x0, 0x8000, 0x2, &(0x7f00000000c0)=0x7}) 20:15:18 executing program 5: 20:15:18 executing program 1: 20:15:18 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') wait4(0x0, 0x0, 0x0, 0x0) 20:15:18 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60236bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:18 executing program 5: 20:15:18 executing program 1: 20:15:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) [ 2156.827759][T10158] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2156.865839][T10158] Error parsing options; rc = [-22] [ 2156.872177][T10157] XFS (loop2): bad version [ 2156.880003][T10157] XFS (loop2): SB validate failed with error -22. [ 2156.926014][ T26] audit: type=1800 audit(1563999318.632:538): pid=10169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16612 res=0 20:15:18 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 2157.065491][T10157] BUG: MAX_STACK_TRACE_ENTRIES too low! [ 2157.071085][T10157] turning off the locking correctness validator. [ 2157.077422][T10157] CPU: 0 PID: 10157 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2157.085473][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2157.086529][T10157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2157.093646][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2157.103649][T10157] Call Trace: [ 2157.103673][T10157] dump_stack+0x172/0x1f0 [ 2157.103689][T10157] save_trace.isra.0.cold+0x14/0x19 [ 2157.103701][T10157] mark_lock+0x3db/0x11e0 [ 2157.103713][T10157] ? print_shortest_lock_dependencies+0x90/0x90 [ 2157.103731][T10157] __lock_acquire+0x1409/0x4c30 [ 2157.142062][T10157] ? __kasan_check_read+0x11/0x20 [ 2157.147103][T10157] ? mark_lock+0xc0/0x11e0 [ 2157.150412][T10180] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2157.151539][T10157] ? mark_lock+0xc0/0x11e0 [ 2157.151558][T10157] ? mark_held_locks+0xf0/0xf0 [ 2157.151575][T10157] lock_acquire+0x190/0x410 [ 2157.151589][T10157] ? flush_workqueue+0xf7/0x14b0 [ 2157.151610][T10157] flush_workqueue+0x126/0x14b0 [ 2157.188017][T10157] ? flush_workqueue+0xf7/0x14b0 [ 2157.190548][T10180] Error parsing options; rc = [-22] [ 2157.192959][T10157] ? lock_downgrade+0x920/0x920 [ 2157.192980][T10157] ? trace_hardirqs_on+0x67/0x240 [ 2157.208029][T10157] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 2157.213942][T10157] ? __call_rcu.constprop.0+0x2ae/0x740 [ 2157.219856][T10157] drain_workqueue+0x1b4/0x470 [ 2157.224626][T10157] ? drain_workqueue+0x1b4/0x470 [ 2157.229576][T10157] destroy_workqueue+0x21/0x6c0 [ 2157.234442][T10157] xfs_destroy_mount_workqueues+0x97/0x150 [ 2157.240432][T10157] xfs_fs_fill_super+0x90f/0x16e0 [ 2157.245667][T10157] mount_bdev+0x304/0x3c0 [ 2157.249996][T10157] ? xfs_test_remount_options+0x90/0x90 [ 2157.258070][T10157] xfs_fs_mount+0x35/0x40 [ 2157.262408][T10157] ? xfs_finish_flags+0x490/0x490 [ 2157.267441][T10157] legacy_get_tree+0x113/0x220 [ 2157.272218][T10157] vfs_get_tree+0x8f/0x380 [ 2157.276640][T10157] do_mount+0x13b3/0x1c30 [ 2157.281128][T10157] ? copy_mount_string+0x40/0x40 [ 2157.286152][T10157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2157.292495][T10157] ? copy_mount_options+0x2e8/0x3f0 [ 2157.297731][T10157] ksys_mount+0xdb/0x150 [ 2157.299370][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2157.302200][T10157] __x64_sys_mount+0xbe/0x150 [ 2157.314054][T10157] do_syscall_64+0xfa/0x760 [ 2157.318274][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2157.318659][T10157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.318675][T10157] RIP: 0033:0x45c27a [ 2157.338572][T10157] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2157.358267][T10157] RSP: 002b:00007fa494abfa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:15:18 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 20:15:18 executing program 1: [ 2157.366691][T10157] RAX: ffffffffffffffda RBX: 00007fa494abfb40 RCX: 000000000045c27a [ 2157.374677][T10157] RDX: 00007fa494abfae0 RSI: 0000000020000080 RDI: 00007fa494abfb00 [ 2157.382856][T10157] RBP: 0000000000000001 R08: 00007fa494abfb40 R09: 00007fa494abfae0 [ 2157.390828][T10157] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 2157.398921][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2157.398992][T10157] R13: 00000000004c8925 R14: 00000000004df5b0 R15: 00000000ffffffff [ 2157.408106][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2157.462614][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2157.470915][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2157.500287][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2157.510316][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2157.534379][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2157.542228][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2157.566320][ T3902] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2157.577933][ T3902] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2157.624531][T10157] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2157.631723][T10157] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2157.707506][ T3902] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2157.715001][ T3902] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:19 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:19 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 20:15:19 executing program 5: 20:15:19 executing program 1: 20:15:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60336bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:19 executing program 5: [ 2157.808864][T10200] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2157.819083][T10200] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2157.841194][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env 20:15:19 executing program 1: 20:15:19 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 2157.858552][T10202] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2157.870547][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2157.873290][T10202] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:19 executing program 5: [ 2157.923304][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2157.934260][ T26] audit: type=1800 audit(1563999319.622:539): pid=10245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16912 res=0 [ 2157.962443][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2157.997367][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2158.021321][T10202] XFS (loop2): bad version [ 2158.026387][T10202] XFS (loop2): SB validate failed with error -22. 20:15:19 executing program 1: 20:15:19 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 2158.037930][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2158.040986][T10196] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2158.099373][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2158.107644][T10196] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2158.112675][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2158.176034][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2158.193967][T10324] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2158.204321][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2158.215752][T10324] Error parsing options; rc = [-22] [ 2158.220238][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2158.230041][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2158.250019][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2158.260446][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2158.275865][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2158.283756][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2158.345363][T10202] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2158.352691][T10202] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2158.394260][T10202] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2158.401755][T10202] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2158.754332][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2158.761561][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2158.774076][ T3902] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2158.782768][ T3902] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:20 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000040)=[{&(0x7f0000000500)}], 0x1, 0x0) 20:15:20 executing program 5: 20:15:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:20 executing program 1: 20:15:20 executing program 4: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 20:15:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60436bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:20 executing program 5: 20:15:20 executing program 1: [ 2158.879894][T10343] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2158.885128][T10345] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2158.888113][T10343] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2158.894130][T10345] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' 20:15:20 executing program 4: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 2158.930286][T10340] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2158.939642][T10340] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2158.951554][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env 20:15:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:20 executing program 1: 20:15:20 executing program 5: [ 2158.998077][ T26] audit: type=1800 audit(1563999320.702:540): pid=10351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17009 res=0 [ 2159.026104][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2159.077456][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2159.089687][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2159.106560][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2159.118072][T10343] XFS (loop2): bad version [ 2159.123811][T10343] XFS (loop2): SB validate failed with error -22. [ 2159.132352][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2159.147336][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2159.156168][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2159.176745][T10364] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2159.183750][T10364] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2159.199773][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2159.207679][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2159.228304][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2159.235692][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2159.249880][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2159.259228][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2159.273119][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2159.276865][T10361] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2159.280469][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2159.287818][T10361] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2159.301555][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2159.316911][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2159.329579][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2159.339283][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2159.376559][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2159.393204][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2159.476611][T10343] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2159.483953][T10343] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2159.512457][T10343] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2159.519856][T10343] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2159.734415][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2159.741634][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:21 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc387}, 0x0, &(0x7f0000000140)={0x1bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:21 executing program 4: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 20:15:21 executing program 5: 20:15:21 executing program 1: 20:15:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60536bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:21 executing program 5: 20:15:21 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 20:15:21 executing program 1: [ 2159.850013][T10489] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2159.862103][T10489] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2159.875955][T10490] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2159.887678][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env [ 2159.899248][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2159.906645][T10490] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2159.966148][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2159.974860][ T26] audit: type=1800 audit(1563999321.682:541): pid=10516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17009 res=0 [ 2159.979202][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' 20:15:21 executing program 1: 20:15:21 executing program 5: 20:15:21 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 2160.035112][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2160.057335][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2160.075383][T10489] XFS (loop2): bad version [ 2160.082212][T10489] XFS (loop2): SB validate failed with error -22. [ 2160.094269][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2160.108919][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2160.132467][T10490] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2160.141300][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2160.158434][T10490] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2160.168967][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2160.199190][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2160.209100][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2160.234777][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2160.250000][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2160.299426][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2160.308901][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2160.326870][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2160.335385][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2160.405313][T10489] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2160.412834][T10489] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2160.453102][T10489] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2160.460764][T10489] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2160.498788][ T3902] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2160.508193][ T3902] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x404000, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x200400, 0x0) io_setup(0x9, &(0x7f0000000300)=0x0) io_cancel(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x6, 0x0, r2, &(0x7f0000000340)="2ddba75e2dc7271a97735a309ebaab2a5b46444988403afcdd", 0x19, 0x8, 0x0, 0x0, r4}, &(0x7f0000000400)) write(r0, &(0x7f0000000180)="bdece912b7ef53d4ff63cb917afbb927e286cda58052d93f530ede59a79043b1f8ecff19c4ec4408baf1f5216559645b016ec0becdad8e259ff7a259863df421cf7a443324432968148e939b13ee71f629ff572efe6c92d02940b3eb", 0x5c) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000002c0)={0x9, 0xff, 0xfe0f, 0xffffffffffffff93}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000200)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:22 executing program 1: 20:15:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x40000106]}) 20:15:22 executing program 5: 20:15:22 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 20:15:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60736bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2160.764397][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2160.771600][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:22 executing program 5: syz_mount_image$minix(&(0x7f00000001c0)='minix\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2160.845389][T10632] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2160.855707][T10632] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2160.878690][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env 20:15:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)) 20:15:22 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x00') [ 2160.890377][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2160.896968][T10628] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2160.911748][T10634] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2160.920399][T10634] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2160.935674][T10628] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2160.960659][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2160.997208][ T26] audit: type=1800 audit(1563999322.702:542): pid=10642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17233 res=0 [ 2160.999989][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2161.049446][ T12] XFS (loop2): bad version 20:15:22 executing program 5: syz_mount_image$minix(&(0x7f00000001c0)='minix\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:15:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, 0x0) [ 2161.057572][T10634] XFS (loop2): SB validate failed with error -22. [ 2161.079074][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2161.093648][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:15:22 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x800) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2161.107842][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2161.119250][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2161.149388][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env 20:15:22 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x00') [ 2161.168787][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2161.210232][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2161.222709][T10727] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2161.226663][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:15:22 executing program 5: syz_mount_image$minix(&(0x7f00000001c0)='minix\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2161.258891][T10727] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2161.273091][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2161.275944][ T26] audit: type=1800 audit(1563999322.982:543): pid=10748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17233 res=0 20:15:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)) 20:15:23 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x00') [ 2161.300951][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2161.320742][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env [ 2161.331657][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2161.356078][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2161.356843][T10634] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2161.363400][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2161.377014][T10634] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2161.393818][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2161.405073][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2161.441438][T10634] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2161.450026][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2161.470022][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2161.470052][T10634] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)) [ 2161.498715][ T3902] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2161.512846][ T3902] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2161.591827][T10698] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env 20:15:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60936bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:23 executing program 5: syz_mount_image$minix(&(0x7f00000001c0)='minix\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2161.676941][T10698] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' 20:15:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, 0x0) 20:15:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)) 20:15:23 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, 0x0) [ 2161.754647][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2161.761962][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2161.798061][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2161.821708][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2161.866559][T10890] Error parsing options; rc = [-22] [ 2161.877521][T10889] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2161.883755][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2161.892388][T10891] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2161.896674][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:15:23 executing program 5: syz_mount_image$minix(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2161.912798][T10891] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2161.935492][T10889] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2161.942940][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2161.995955][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2162.038227][T10891] XFS (loop2): bad version [ 2162.048722][T10891] XFS (loop2): SB validate failed with error -22. [ 2162.061755][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2162.078210][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' 20:15:23 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:23 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, 0x0) 20:15:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) 20:15:23 executing program 5: syz_mount_image$minix(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2162.157156][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2162.163691][T10889] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2162.170560][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2162.188091][T10889] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2162.225619][T11014] Error parsing options; rc = [-22] 20:15:23 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, &(0x7f00000002c0)) pivot_root(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)='./bus\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="79d28df8fa50"], 0x6) fallocate(r0, 0x3, 0x0, 0x8020001) 20:15:24 executing program 4: mknod$loop(&(0x7f00000012c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, 0x0) [ 2162.277591][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env [ 2162.300350][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2162.325584][ T26] audit: type=1800 audit(1563999324.032:544): pid=11019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16594 res=0 [ 2162.338218][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2162.369488][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2162.383732][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2162.391378][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2162.415710][T10891] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2162.430523][T10891] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2162.458364][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2162.486657][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2162.486781][T10891] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2162.499015][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2162.511456][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2162.515699][T10891] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2162.535665][T11112] Error parsing options; rc = [-22] 20:15:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, 0x0) 20:15:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) 20:15:24 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, &(0x7f00000002c0)) pivot_root(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)='./bus\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="79d28df8fa50"], 0x6) fallocate(r0, 0x3, 0x0, 0x8020001) 20:15:24 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, 0x0, &(0x7f00000002c0)) pivot_root(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)='./bus\x00') keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="79d28df8fa50"], 0x6) fallocate(r1, 0x3, 0x0, 0x8020001) 20:15:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d60a36bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) [ 2162.618943][T11134] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2162.634619][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2162.641825][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2162.642376][T11134] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' 20:15:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) [ 2162.705297][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2162.712480][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2162.731403][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2162.773897][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2162.843450][T11263] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2162.852306][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2162.859789][T11263] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2162.869569][T11134] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2162.889379][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2162.930449][T11134] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2163.010311][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2163.021316][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2163.034975][T11263] XFS (loop2): bad version [ 2163.040051][T11263] XFS (loop2): SB validate failed with error -22. 20:15:24 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x28, &(0x7f0000000040)}, 0x10) write(r1, &(0x7f0000000340), 0x41395527) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000002700)={@dev, @local, 0x0}, &(0x7f0000002740)=0xc) accept4(r2, &(0x7f0000002840)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000028c0)=0x80, 0x80000) getsockname$packet(r1, &(0x7f00000029c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a00)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000002b00)={0x0, @local, @empty}, &(0x7f0000002b40)=0xc) getsockname$packet(r2, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002bc0)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000002c00)={0x0, @local, @multicast2}, &(0x7f0000002c40)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002d40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002e40)=0xe8) accept4(r2, &(0x7f0000002e80)=@hci={0x1f, 0x0}, &(0x7f0000002f00)=0x80, 0x80800) openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x10441, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002f40)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000003000)={@loopback, 0x0}, &(0x7f0000003040)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000033c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000003380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00030000", @ANYRES16=r3, @ANYBLOB="000825bd7000fcdbdf250000000008000100", @ANYRES32=r4, @ANYBLOB="74010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e6700000000000008b20000040000000000000000bf71fe904ae866bcfcabfeb37efeeb3f7d9c1500b72c6c65a8c2431f8ef77a382ee027e0d9ae87c52d860337e0df8be83fe80b9f33cc20f7ac7bfae424e3b03f09f298219cdcccd3b4467b76475e47c5924e447d", @ANYRES32=r6, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040003004707cd01000008000100", @ANYRES32=r9, @ANYBLOB="6801020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400aaa600003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ffffff7f3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13], 0x300}, 0x1, 0x0, 0x0, 0x44080}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2163.073801][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2163.095146][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:15:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) 20:15:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x0, 0x0, [0x40000106]}) 20:15:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) 20:15:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 20:15:24 executing program 4: fanotify_init(0x0, 0x4) [ 2163.197764][T11364] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2163.214321][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env [ 2163.221528][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2163.228557][T11364] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2163.276718][ T26] audit: type=1800 audit(1563999324.982:545): pid=11384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16872 res=0 [ 2163.301596][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env 20:15:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) 20:15:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') [ 2163.321318][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2163.339434][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2163.356222][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:15:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) 20:15:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x0, 0x0, [0x40000106]}) [ 2163.411398][T11360] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2163.419385][T11263] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2163.429446][T11360] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2163.432825][T11263] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2163.510025][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2163.541491][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2163.556310][T11263] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2163.564721][T11263] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2163.587161][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env 20:15:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d61036bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:25 executing program 1: syz_open_procfs(0x0, 0x0) [ 2163.619057][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2163.636939][T11488] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2163.643949][T11488] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2163.667417][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2163.677164][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2163.697713][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2163.708327][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2163.750106][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2163.761586][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2163.788103][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2163.818789][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2163.852996][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2163.856793][T11488] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2163.867032][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2163.867425][T11596] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2163.885939][T11596] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2163.891270][T11488] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2163.988236][T26912] XFS (loop2): bad version [ 2163.992903][T11596] XFS (loop2): SB validate failed with error -22. [ 2163.995712][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2164.007058][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:15:25 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x201) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) 20:15:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) 20:15:25 executing program 1: syz_open_procfs(0x0, 0x0) 20:15:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x0, 0x0, [0x40000106]}) 20:15:25 executing program 1: syz_open_procfs(0x0, 0x0) 20:15:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) [ 2164.130856][T11616] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2164.141071][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env [ 2164.151044][T11616] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2164.161070][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2164.183334][T11610] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2164.192178][T11610] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2164.218140][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env 20:15:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) [ 2164.232139][ T26] audit: type=1800 audit(1563999325.932:546): pid=11619 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17313 res=0 [ 2164.268382][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' 20:15:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) 20:15:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b}) [ 2164.302161][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2164.310298][T11596] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2164.311575][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2164.346546][T11596] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2164.420033][ T3902] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2164.430720][ T3902] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2164.451606][T11596] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2164.470128][T11635] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2164.476150][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2164.482146][T11596] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2164.485217][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2164.501957][T11635] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2164.511616][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env 20:15:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d61436bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2164.553129][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2164.580033][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2164.590000][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2164.610844][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2164.628656][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2164.694418][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2164.707726][T11630] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2164.714016][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2164.724268][T11630] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2164.796967][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2164.808881][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2164.820187][T11747] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2164.837737][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2164.847581][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2164.854468][T11747] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2164.930769][ T8558] XFS (loop2): bad version [ 2164.935459][T11747] XFS (loop2): SB validate failed with error -22. 20:15:26 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) 20:15:26 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4080) 20:15:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b}) 20:15:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:26 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x4080) [ 2165.108309][T11765] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2165.123700][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env [ 2165.134004][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2165.144313][T11765] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' 20:15:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) [ 2165.172361][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2165.191088][ T26] audit: type=1800 audit(1563999326.892:547): pid=11786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17009 res=0 [ 2165.199491][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2165.227316][T11747] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2165.237495][T11747] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2165.262656][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2165.293639][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2165.312760][T11760] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2165.324419][T11747] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2165.326489][T11760] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' 20:15:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2165.341799][T11747] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2165.357190][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env 20:15:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d63036bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b}) [ 2165.385369][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' 20:15:27 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x4080) [ 2165.439580][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2165.460955][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2165.508347][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2165.517372][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2165.534593][T11882] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2165.543963][T11882] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2165.558383][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2165.583864][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2165.589856][T11889] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2165.597571][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2165.610589][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2165.628122][T11887] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2165.657051][T11889] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2165.669945][T11887] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2165.780668][ T681] XFS (loop2): bad version [ 2165.790242][T11889] XFS (loop2): SB validate failed with error -22. [ 2165.793001][T11884] kobject: 'kvm' (00000000d5c60f11): kobject_uevent_env [ 2165.803999][T11884] kobject: 'kvm' (00000000d5c60f11): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2165.846085][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2165.853366][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:15:27 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000200)=0x7, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x1008, 0x5, "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"}, &(0x7f00000001c0), 0x5e21355db54d526e) open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x90) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) accept4$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff}, 0x10, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:15:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) 20:15:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:27 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x4080) 20:15:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) [ 2166.035319][T11889] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2166.042540][T11889] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2166.089441][T11889] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2166.107176][T11889] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:15:27 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) 20:15:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) 20:15:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="58465342c23344d0a3f0cd039bad97f2c099f3c33e5a725cd440aa825ae4b73c4116f851a4cdd74becb4db3f33db8d3007e7473626810d3d7ba59109e91722b9a0b8d63b36bdb3d7fe2680adda94f64c85b66ec25c0f648e15ec54396ad89e4e03d60947c5cd6f", 0x67}], 0x0, 0x0) 20:15:27 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 2166.133003][ T3902] kobject: 'loop3' (00000000c6b640aa): kobject_uevent_env [ 2166.152200][ T3902] kobject: 'loop3' (00000000c6b640aa): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2166.193630][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2166.206868][ T26] audit: type=1800 audit(1563999327.912:548): pid=12020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16507 res=0 [ 2166.218970][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2166.243205][ T26] audit: type=1804 audit(1563999327.912:549): pid=12020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir645086217/syzkaller.Ws4jF3/686/file0" dev="sda1" ino=16507 res=1 [ 2166.251644][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2166.278356][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' 20:15:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2166.286481][ T26] audit: type=1800 audit(1563999327.912:550): pid=12020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16507 res=0 20:15:28 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0), 0x1}, 0x20) [ 2166.335622][T30450] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2166.351006][T30450] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2166.375437][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2166.403666][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2166.480006][ T3902] kobject: 'loop5' (00000000c244e1c3): kobject_uevent_env [ 2166.518287][ T3902] kobject: 'loop5' (00000000c244e1c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2166.537943][T12040] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2166.546244][T12040] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2166.558235][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2166.566908][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2166.579495][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2166.587346][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2166.609178][ T3902] kobject: 'loop0' (00000000d5c84ebd): kobject_uevent_env [ 2166.616605][ T3902] kobject: 'loop0' (00000000d5c84ebd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2166.628399][ T3902] kobject: 'loop4' (00000000ab79de9b): kobject_uevent_env [ 2166.636056][ T3902] kobject: 'loop4' (00000000ab79de9b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2166.647804][ T3902] kobject: 'loop1' (000000006fe2eaf9): kobject_uevent_env [ 2166.655260][ T3902] kobject: 'loop1' (000000006fe2eaf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2166.655519][T12040] XFS (loop2): bad version [ 2166.687073][T12040] XFS (loop2): SB validate failed with error -22. [ 2166.965170][T12040] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2166.972360][T12040] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2166.985502][ T26] audit: type=1800 audit(1563999328.692:551): pid=12020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16507 res=0 [ 2166.987115][ T3902] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2167.017037][T12040] kobject: 'loop2' (00000000eeece4ef): kobject_uevent_env [ 2167.023687][ T3902] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2167.025650][T12040] kobject: 'loop2' (00000000eeece4ef): fill_kobj_path: path = '/devices/virtual/block/loop2'