[info] Using makefile-style concurrent boot in runlevel 2. [ 26.827180] audit: type=1800 audit(1544542969.477:21): pid=5899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.170' (ECDSA) to the list of known hosts. 2018/12/11 15:42:58 fuzzer started 2018/12/11 15:43:00 dialing manager at 10.128.0.26:34565 syzkaller login: [ 37.784328] ld (6084) used greatest stack depth: 15184 bytes left 2018/12/11 15:43:00 syscalls: 1 2018/12/11 15:43:00 code coverage: enabled 2018/12/11 15:43:00 comparison tracing: enabled 2018/12/11 15:43:00 setuid sandbox: enabled 2018/12/11 15:43:00 namespace sandbox: enabled 2018/12/11 15:43:00 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/11 15:43:00 fault injection: enabled 2018/12/11 15:43:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/11 15:43:00 net packet injection: enabled 2018/12/11 15:43:00 net device setup: enabled 15:45:55 executing program 0: [ 212.890885] IPVS: ftp: loaded support on port[0] = 21 15:45:55 executing program 1: [ 213.178878] IPVS: ftp: loaded support on port[0] = 21 15:45:56 executing program 2: [ 213.539582] IPVS: ftp: loaded support on port[0] = 21 15:45:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00004aaffc)=0x2, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 214.038564] IPVS: ftp: loaded support on port[0] = 21 15:45:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='ecryptfs\x00', 0x0, 0x0) [ 214.396727] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.431291] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.438902] device bridge_slave_0 entered promiscuous mode [ 214.607678] IPVS: ftp: loaded support on port[0] = 21 [ 214.621578] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.629165] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.659481] device bridge_slave_1 entered promiscuous mode [ 214.763734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.893332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.925671] bridge0: port 1(bridge_slave_0) entered blocking state 15:45:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x1, r1}, 0x2c) [ 214.949727] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.972623] device bridge_slave_0 entered promiscuous mode [ 215.159641] IPVS: ftp: loaded support on port[0] = 21 [ 215.171331] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.177759] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.186737] device bridge_slave_1 entered promiscuous mode [ 215.328244] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.337168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.455545] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.468888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.669806] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.700228] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.710964] device bridge_slave_0 entered promiscuous mode [ 215.836102] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.850377] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.870039] device bridge_slave_1 entered promiscuous mode [ 215.916020] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.030254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.078688] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.126031] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.136326] team0: Port device team_slave_0 added [ 216.162100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.170551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.186338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.266685] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.281940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.300953] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.307415] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.320383] device bridge_slave_0 entered promiscuous mode [ 216.365305] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.376642] team0: Port device team_slave_1 added [ 216.484638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.514732] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.523419] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.535958] device bridge_slave_1 entered promiscuous mode [ 216.549624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.601441] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.611513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.687728] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.713887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.729096] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.738794] team0: Port device team_slave_0 added [ 216.752079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.770549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.792332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.830333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.837790] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.851217] team0: Port device team_slave_1 added [ 216.856399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.866435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.892597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.899472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.963056] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.975194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.985020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.027630] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.060155] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.067665] device bridge_slave_0 entered promiscuous mode [ 217.078506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.096951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.120745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.137498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.154115] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.236904] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.251666] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.258065] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.275228] device bridge_slave_1 entered promiscuous mode [ 217.282845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.299519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.316633] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.367911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.395727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.418340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.433146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 217.460618] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.542719] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.557472] team0: Port device team_slave_0 added [ 217.589722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.672305] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.679788] team0: Port device team_slave_1 added [ 217.830224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.940578] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.947055] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.963101] device bridge_slave_0 entered promiscuous mode [ 217.976229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 218.001490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.011540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.057435] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.092993] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.099653] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.107582] device bridge_slave_1 entered promiscuous mode [ 218.125046] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.152254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.162698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.186600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.210764] team0: Port device team_slave_0 added [ 218.220752] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.231138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.290357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.298004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.310820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.360149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.386132] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.400579] team0: Port device team_slave_1 added [ 218.409150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 218.417000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.498524] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.505186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.512346] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.518728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.534992] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.567372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.578645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.633556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.771476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.789821] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.796313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.803090] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.809486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.845724] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.860567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.868450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.884217] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.916427] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.932654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.954409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.030794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.038008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.046628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.074136] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.081747] team0: Port device team_slave_0 added [ 219.091198] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.255715] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.269604] team0: Port device team_slave_1 added [ 219.277460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.316328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.402217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 219.423001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.444998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.463591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.480891] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.541173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.639356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.662556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.677939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.780645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.787841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.798026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.870199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.890249] team0: Port device team_slave_0 added [ 219.989683] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.996151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.002891] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.009263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.028943] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.039834] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.048170] team0: Port device team_slave_1 added [ 220.158254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.165532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.184831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.320364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.327295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.337833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.430670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.437883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.446336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.570622] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.577820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.602183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.622047] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.628458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.635205] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.641645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.657630] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.901190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.913494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.268955] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.275393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.282116] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.288484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.311788] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.958998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.031602] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.038007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.044753] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.051237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.060899] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.990090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.176789] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.271182] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.671933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.729785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.948694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.090341] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.132725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.139898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.281129] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.287315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.294604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.577243] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.634705] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.781311] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.874066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.032370] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.038570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.046990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.238813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.324181] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.462935] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.742794] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.842064] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.848363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.857828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.177447] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.190710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.214120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.370401] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.491061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.665642] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.017619] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 15:46:11 executing program 1: [ 228.519784] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.550172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.560925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:46:11 executing program 1: 15:46:11 executing program 0: 15:46:11 executing program 1: 15:46:11 executing program 0: 15:46:11 executing program 1: 15:46:11 executing program 0: 15:46:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 229.109384] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.168224] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option [ 229.190734] XFS (loop1): RT mount failed 15:46:12 executing program 2: 15:46:12 executing program 3: 15:46:12 executing program 4: pipe2(&(0x7f0000000000), 0x86778c6146abd5ba) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) getgroups(0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000140), 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) capset(&(0x7f0000000340), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x4000000000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) [ 230.114287] Error parsing options; rc = [-22] [ 230.237126] hrtimer: interrupt took 29545 ns 15:46:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@loopback}, &(0x7f0000001640)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x10000, 0x0) fsetxattr$security_evm(r1, &(0x7f00000002c0)='security.evm\x00', 0x0, 0x0, 0x1) r2 = eventfd2(0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ioctl$TIOCEXCL(r3, 0x540c) ftruncate(r3, 0xb3d4) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000300)={0x800}) sendfile(r2, r3, &(0x7f0000000040), 0x2008004fffffffe) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 15:46:13 executing program 0: socket$inet6(0xa, 0x3, 0x800000000000006) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) prlimit64(r1, 0xe, 0x0, &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) exit(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc) request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000240)='GPL\x00', 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xfffffffffffffedf) write$tun(0xffffffffffffffff, &(0x7f0000000600)={@val={0x0, 0x60}, @val={0x1, 0x80, 0x14, 0x7, 0x0, 0xa40}, @mpls={[], @llc={@llc={0x87acbe1730a28e0c, 0xfe, 'h', "b0df0b0f22c32fc210aeff4ab85ec18f3ef87994c8e21a409113711fd12ac1f3b4cda04de333ed86d38c24911dc05c9319e78e02bb2f6478908b874bee7fa9482e01ddbced43bc92cc178c6acfc9012d0c3de3a09dc692d450ae47e3bc5eb16ba933724baf"}}}}, 0x76) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz1'}, 0x4) 15:46:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:13 executing program 2: 15:46:13 executing program 3: 15:46:13 executing program 4: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 15:46:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) 15:46:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@loopback}, &(0x7f0000001640)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x10000, 0x0) fsetxattr$security_evm(r1, &(0x7f00000002c0)='security.evm\x00', 0x0, 0x0, 0x1) r2 = eventfd2(0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ioctl$TIOCEXCL(r3, 0x540c) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000015c0)='trusted.overlay.redirect\x00', &(0x7f0000001600)='./file0\x00', 0x8, 0x0) ftruncate(r3, 0xb3d4) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000300)={0x800}) sendfile(r2, r3, &(0x7f0000000040), 0x2008004fffffffe) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) [ 230.493911] binder_alloc: binder_alloc_mmap_handler: 7693 20000000-20003000 already mapped failed -16 [ 230.516627] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 15:46:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="00002000a3e454a3b9fbfd"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 230.571478] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option 15:46:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x6, 0xfffffffffffffb54}}, 0x50) [ 230.617381] XFS (loop1): RT mount failed [ 230.779376] kauditd_printk_skb: 9 callbacks suppressed [ 230.779404] audit: type=1326 audit(1544543173.427:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7716 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 15:46:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:13 executing program 4: syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x86778c6146abd5ba) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) lstat(&(0x7f0000004600)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000084c0), 0x0, 0x0) getpgrp(0x0) capset(&(0x7f0000000340)={0x20080522}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x00', 0x4000000000) ftruncate(r1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, &(0x7f0000040000)) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) 15:46:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@loopback}, &(0x7f0000001640)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x10000, 0x0) fsetxattr$security_evm(r1, &(0x7f00000002c0)='security.evm\x00', 0x0, 0x0, 0x1) r2 = eventfd2(0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ioctl$TIOCEXCL(r3, 0x540c) ftruncate(r3, 0xb3d4) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000300)={0x800}) sendfile(r2, r3, &(0x7f0000000040), 0x2008004fffffffe) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 231.106177] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option [ 231.120330] XFS (loop1): RT mount failed 15:46:13 executing program 0: socket$inet6(0xa, 0x3, 0x800000000000006) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) prlimit64(r1, 0xe, 0x0, &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) exit(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc) request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000240)='GPL\x00', 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xfffffffffffffedf) write$tun(0xffffffffffffffff, &(0x7f0000000600)={@val={0x0, 0x60}, @val={0x1, 0x80, 0x14, 0x7, 0x0, 0xa40}, @mpls={[], @llc={@llc={0x87acbe1730a28e0c, 0xfe, 'h', "b0df0b0f22c32fc210aeff4ab85ec18f3ef87994c8e21a409113711fd12ac1f3b4cda04de333ed86d38c24911dc05c9319e78e02bb2f6478908b874bee7fa9482e01ddbced43bc92cc178c6acfc9012d0c3de3a09dc692d450ae47e3bc5eb16ba933724baf"}}}}, 0x76) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz1'}, 0x4) 15:46:13 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x4a00) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(r0, r1, &(0x7f0000000040), 0x8000fffffffe) truncate(&(0x7f0000000100)='./bus\x00', 0x0) 15:46:13 executing program 4: syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x86778c6146abd5ba) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) lstat(&(0x7f0000004600)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000084c0), 0x0, 0x0) getpgrp(0x0) capset(&(0x7f0000000340)={0x20080522}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x00', 0x4000000000) ftruncate(r1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, &(0x7f0000040000)) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) 15:46:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:14 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x86778c6146abd5ba) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000040)={0x4, 0x7, 0x6}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) geteuid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, 0x0, 0x0) lstat(&(0x7f0000004600)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000084c0), 0x0, 0x0) getpgrp(0x0) capset(&(0x7f0000000340)={0x20080522}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000100)='\x00', 0x4000000000) ftruncate(r3, 0x40001) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, &(0x7f0000040000)) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000180)) [ 231.392403] audit: type=1804 audit(1544543174.047:32): pid=7762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir503199107/syzkaller.jpO7MA/5/bus" dev="sda1" ino=16555 res=1 15:46:14 executing program 5: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x4a00) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x8000fffffffe) truncate(&(0x7f0000000100)='./bus\x00', 0x0) [ 231.517700] audit: type=1804 audit(1544543174.137:33): pid=7762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir503199107/syzkaller.jpO7MA/5/bus" dev="sda1" ino=16555 res=1 [ 231.543384] XFS (loop1): Filesystem has a realtime volume, use rtdev=device option [ 231.571159] syz-executor3 (7762) used greatest stack depth: 13528 bytes left [ 231.572704] XFS (loop1): RT mount failed [ 231.613844] audit: type=1804 audit(1544543174.137:34): pid=7781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir503199107/syzkaller.jpO7MA/5/bus" dev="sda1" ino=16555 res=1 [ 231.638859] audit: type=1326 audit(1544543174.197:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7716 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 [ 231.682460] audit: type=1804 audit(1544543174.237:36): pid=7788 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir594603418/syzkaller.UnMjmM/3/bus" dev="sda1" ino=16557 res=1 [ 231.761452] audit: type=1804 audit(1544543174.327:37): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir594603418/syzkaller.UnMjmM/3/bus" dev="sda1" ino=16557 res=1 15:46:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@loopback}, &(0x7f0000001640)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x10000, 0x0) fsetxattr$security_evm(r1, &(0x7f00000002c0)='security.evm\x00', 0x0, 0x0, 0x1) r2 = eventfd2(0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ioctl$TIOCEXCL(r3, 0x540c) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000015c0)='trusted.overlay.redirect\x00', &(0x7f0000001600)='./file0\x00', 0x8, 0x0) ftruncate(r3, 0xb3d4) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000300)={0x800}) sendfile(r2, r3, &(0x7f0000000040), 0x2008004fffffffe) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:46:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000001c0)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) r1 = socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={"6970365f767469b0001000000000007a"}) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001840)}], 0x1}, 0x80) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x0, 0x0) 15:46:14 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x86778c6146abd5ba) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000040)={0x4, 0x7, 0x6}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) geteuid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, 0x0, 0x0) lstat(&(0x7f0000004600)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000084c0), 0x0, 0x0) getpgrp(0x0) capset(&(0x7f0000000340)={0x20080522}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000100)='\x00', 0x4000000000) ftruncate(r3, 0x40001) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r4 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, &(0x7f0000040000)) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000180)) 15:46:14 executing program 5: [ 231.803653] audit: type=1804 audit(1544543174.337:38): pid=7788 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir594603418/syzkaller.UnMjmM/3/bus" dev="sda1" ino=16557 res=1 15:46:14 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 231.864712] IPVS: ftp: loaded support on port[0] = 21 15:46:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) [ 232.042411] audit: type=1326 audit(1544543174.697:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7806 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 15:46:14 executing program 0: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x4a00) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, &(0x7f0000000040), 0x8000fffffffe) truncate(&(0x7f0000000100)='./bus\x00', 0x0) 15:46:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) dup3(r0, r1, 0x0) 15:46:14 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) [ 232.318201] audit: type=1804 audit(1544543174.967:40): pid=7831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir634358412/syzkaller.uFg1iu/6/bus" dev="sda1" ino=16557 res=1 15:46:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x5) r3 = dup3(r2, r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000200)={0x0, 0xfff}) write$UHID_INPUT(r3, &(0x7f0000004700)={0x8, "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", 0xffffffffffffff72}, 0x1006) [ 232.521153] syz-executor0 (7831) used greatest stack depth: 13368 bytes left 15:46:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"765eec8973ffff00", 0xd803}) [ 232.665694] IPVS: ftp: loaded support on port[0] = 21 15:46:15 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RMKNOD(r0, &(0x7f0000000140)={0x14}, 0x14) 15:46:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:15 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:15 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0xa) read(r0, &(0x7f00000000c0)=""/203, 0xffffff37) 15:46:15 executing program 4: open(0x0, 0x0, 0x41) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) mount(&(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 15:46:15 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='debugfs\x00', 0x0, 0x0) 15:46:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:15 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='debugfs\x00', 0x0, &(0x7f00000001c0)='limits\x00') 15:46:15 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 15:46:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x500, 0x41) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002ac0)=""/4096, 0x1125) 15:46:15 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='system.posix_acl_access\x00', &(0x7f0000000d00)={{}, {}, [], {}, [{}, {}, {0x8, 0x1}], {}, {0x20, 0x3}}, 0x3c, 0x0) 15:46:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='system.posix_acl_access\x00', &(0x7f0000000d00)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) [ 233.268192] FAT-fs (loop0): bogus number of reserved sectors 15:46:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 15:46:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="110000000000000001"]}) 15:46:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:16 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) [ 233.367501] FAT-fs (loop0): Can't find a valid FAT filesystem [ 233.464730] FAT-fs (loop0): bogus number of reserved sectors [ 233.500546] FAT-fs (loop0): Can't find a valid FAT filesystem 15:46:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 15:46:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r1, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) 15:46:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="00008ad355e624e4b7403777dc2e88ee3012e114bc81345df02b20c2548468c46839cda50cb798d447ad97a1539467b0e727b1e8555ef95b4fccd76b61e3b01f4d2a33d3e1a7de945c8330ea08312b85d17e389bd3c6654a0a2c244a670c32b716fb182aa72e3a3113"], 0x69) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r0, 0x5406, &(0x7f00000002c0)={0xfffffffffffffffc}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 15:46:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x208200) fstatfs(r1, &(0x7f0000000040)=""/1) 15:46:16 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f00000001c0)={0x0, 0x1}) 15:46:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 15:46:16 executing program 4: open(&(0x7f0000000180)='./file0/file0\x00', 0x500, 0x41) openat$rfkill(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/34, 0x22) getdents(r0, &(0x7f0000002ac0)=""/4096, 0x1125) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fchown(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 15:46:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, 0x0) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002ac0)=""/4096, 0x1125) fchown(0xffffffffffffffff, 0x0, 0x0) 15:46:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 15:46:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x2, 0x1100082) r1 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0xffffffff) sendfile(r0, r0, 0x0, 0x2000005) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) request_key(0x0, &(0x7f0000000400)={'syz', 0x0}, 0x0, 0xfffffffffffffffd) sendmsg(r1, 0x0, 0x4000000) 15:46:16 executing program 4: open(&(0x7f0000000180)='./file0/file0\x00', 0x500, 0x41) openat$rfkill(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/34, 0x22) getdents(r0, &(0x7f0000002ac0)=""/4096, 0x1125) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fchown(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 15:46:16 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 15:46:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81, 0x2b}, 0x2c) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000580)=0x0) ioctl$VT_SETMODE(r1, 0x5602, 0x0) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000380)) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000000600)=ANY=[@ANYRESHEX=r2], 0x12}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176"], 0x42) getsockopt$inet6_mreq(r1, 0x29, 0x1f, 0x0, &(0x7f00000000c0)) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x8400) 15:46:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(0x0, &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, 0x0) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0x0, @remote}]}, &(0x7f0000000380)=0x10) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:17 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) [ 234.532121] XFS (loop1): Invalid superblock magic number 15:46:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81, 0x2b}, 0x2c) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000580)=0x0) ioctl$VT_SETMODE(r1, 0x5602, 0x0) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000380)) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000000600)=ANY=[@ANYRESHEX=r2], 0x12}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176"], 0x42) getsockopt$inet6_mreq(r1, 0x29, 0x1f, 0x0, &(0x7f00000000c0)) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x8400) 15:46:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(0x0, &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, 0x0) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0x0, @remote}]}, &(0x7f0000000380)=0x10) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 234.866964] XFS (loop1): Invalid superblock magic number 15:46:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 15:46:17 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 15:46:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x2, 0x1100082) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$P9_RLOCK(r1, &(0x7f0000000040)={0x8, 0x35, 0x0, 0x2}, 0xfffffffffffffef7) sendfile(r0, r0, &(0x7f0000000240), 0x2000005) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='}(\x00', 0xfffffffffffffffd) add_key(&(0x7f0000000380)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000980)="d4ad23d13b", 0x5}], 0x1, 0x0, 0x0, 0x4000880}, 0x4000000) 15:46:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81, 0x2b}, 0x2c) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000580)=0x0) ioctl$VT_SETMODE(r1, 0x5602, 0x0) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000380)) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000000600)=ANY=[@ANYRESHEX=r2], 0x12}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176"], 0x42) getsockopt$inet6_mreq(r1, 0x29, 0x1f, 0x0, &(0x7f00000000c0)) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x8400) 15:46:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:18 executing program 4: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00'}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x2, 0x1100082) r1 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffff) sendfile(r0, r0, &(0x7f0000000240), 0x2000005) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000200)='/dev/loop#\x00') [ 235.507672] XFS (loop1): Invalid superblock magic number 15:46:18 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) socket$inet(0x2, 0x3, 0x80800000000000a) 15:46:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f00000000c0)=0x14) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x2, 0x1100082) r1 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) sendfile(r0, r0, 0x0, 0x2000005) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, 0x0, &(0x7f0000000440)='}(\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000001c0)='rxrpc\x00', 0x0) [ 235.672844] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure 15:46:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 15:46:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x2, 0x1100082) r1 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffffff) sendfile(r0, r0, 0x0, 0x2000005) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='}(\x00', 0xfffffffffffffffd) add_key(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 15:46:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:18 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='pipefs\x00', 0xc0ed0000, 0x0) 15:46:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:18 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 236.066281] XFS (loop1): Invalid superblock magic number [ 236.196383] binder: 8146:8148 transaction failed 29189/-22, size 0-0 line 2850 [ 236.343423] binder: undelivered TRANSACTION_ERROR: 29189 15:46:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xf613, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") 15:46:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000"], 0x1}, 0x8}, 0x0) 15:46:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 15:46:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:19 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000040)='\x00') 15:46:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:19 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:19 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffad, &(0x7f0000000000)) 15:46:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0070e0bf45194cbedfa0c9d2a70d5c5116be515420bf94551fb98ba337ab86785eae40df099eedc17470e16892d6eedc5ba52d1f18e6850a05be5dcc0b087ff3d176e1"], 0x43) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 236.804978] XFS (loop1): Invalid superblock magic number 15:46:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 237.217437] XFS (loop1): Invalid superblock magic number 15:46:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000300)=[0x659]) 15:46:20 executing program 3: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:46:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) 15:46:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() getegid() process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:20 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") 15:46:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) [ 237.864869] XFS (loop1): Invalid superblock magic number 15:46:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) 15:46:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) [ 238.284316] XFS (loop1): Invalid superblock magic number 15:46:21 executing program 3: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:46:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) 15:46:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:21 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) geteuid() process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:21 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x0, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 238.801658] XFS (loop1): Invalid superblock magic number 15:46:21 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000040)='\x00') 15:46:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000940), 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) 15:46:21 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x0, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 239.115822] XFS (loop1): Invalid superblock magic number 15:46:22 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 15:46:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") 15:46:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x0, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) 15:46:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0x0, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) getgid() process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 239.545790] XFS (loop1): Invalid superblock magic number 15:46:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0x0, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:22 executing program 3: clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 15:46:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, 0x0) 15:46:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000001c0)={0x8000000, 0x10001, 0x9, 0x200, 0x3}) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 240.007932] XFS (loop1): Invalid superblock magic number 15:46:22 executing program 4: readv(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) fsetxattr$trusted_overlay_nlink(r1, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x60) 15:46:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0x0, 0x4}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, 0x0) 15:46:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:23 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 240.376995] XFS (loop1): Invalid superblock magic number 15:46:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, 0x0) 15:46:23 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x80000001) getresgid(&(0x7f00000004c0), &(0x7f00000005c0), 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 241.027719] XFS (loop1): Invalid superblock magic number 15:46:24 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff}}, 0xa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 15:46:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:24 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x80000001) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:24 executing program 4: readv(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) fsetxattr$trusted_overlay_nlink(r1, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x60) 15:46:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, 0x0) 15:46:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:24 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 15:46:24 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 241.886544] XFS (loop1): Invalid superblock magic number 15:46:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:24 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 15:46:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000", 0x3f}], 0x0, 0x0) 15:46:24 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 242.277674] XFS (loop1): device supports 512 byte sectors (not 0) 15:46:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:25 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 15:46:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:25 executing program 4: mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000240), &(0x7f0000000140)='.', 0x0, 0x3002480, 0x0) 15:46:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000", 0x3f}], 0x0, 0x0) 15:46:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:25 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, 0x0, 0x0) 15:46:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:25 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, 0x0, 0x0) 15:46:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:25 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000300)) [ 242.897645] XFS (loop1): device supports 512 byte sectors (not 0) 15:46:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:25 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$cgroup_pid(r1, 0x0, 0x0) 15:46:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000", 0x3f}], 0x0, 0x0) 15:46:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 243.055322] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted [ 243.206146] XFS (loop1): device supports 512 byte sectors (not 0) 15:46:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='\x00hed\x00\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f00000001c0)=""/213, 0xd5) 15:46:26 executing program 5: 15:46:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000000000000000400000100000000080000000000000008100000000000000820000000100001000000000010000", 0x5e}], 0x0, 0x0) 15:46:26 executing program 5: 15:46:26 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:26 executing program 4: [ 243.685144] XFS (loop1): device supports 512 byte sectors (not 0) 15:46:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000000000000000400000100000000080000000000000008100000000000000820000000100001000000000010000", 0x5e}], 0x0, 0x0) 15:46:26 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x4e21, 0x5, @loopback, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000740)="812720b6e1b512dec07a2f301e9f846edf5caf29d14d5ec290db8db77f01484cc410845b33df9f95a4d5d43e5a12a4b782575ba023dced01b50d446f486a473799507191a6fa24bb7311cb865df9055ee0816eeb058256f0d99cc776bc3899d46f6e5a4c3f4936146fda1b3f44de2d7e623c869db3a775d65c8c230ac1490864932a7a513a1cce99c70d3bb5a774f6f96b1ea3d73688ccee3ba78279f771dac7ab37087dcea096cbbd9007c68d2f03dc73ab86c44f4f80a4b2f66cbd43cdc8a943c18c8c714b4a5d3b98f09d8c8a30fb98ee366481f1fe00598cc39a1f44", 0xde}], 0x1}, 0x20004880) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x8}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000740)}, 0x20004040) close(r1) 15:46:26 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 244.030211] XFS (loop1): device supports 512 byte sectors (not 0) 15:46:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x50, &(0x7f0000000200)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000bc0)=0xb76) 15:46:27 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:27 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:27 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x4e21, 0x5, @loopback, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000740)="812720b6e1b512dec07a2f301e9f846edf5caf29d14d5ec290db8db77f01484cc410845b33df9f95a4d5d43e5a12a4b782575ba023dced01b50d446f486a473799507191a6fa24bb7311cb865df9055ee0816eeb058256f0d99cc776bc3899d46f6e5a4c3f4936146fda1b3f44de2d7e623c869db3a775d65c8c230ac1490864932a7a513a1cce99c70d3bb5a774f6f96b1ea3d73688ccee3ba78279f771dac7ab37087dcea096cbbd9007c68d2f03dc73ab86c44f4f80a4b2f66cbd43cdc8a943c18c8c714b4a5d3b98f09d8c8a30fb98ee366481f1fe00598cc39a1f44", 0xde}], 0x1}, 0x20004880) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x8}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000740)}, 0x20004040) close(r1) 15:46:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000000000000000400000100000000080000000000000008100000000000000820000000100001000000000010000", 0x5e}], 0x0, 0x0) 15:46:27 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000400)=0x194e, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x400000000}, 0x1c) sendto$inet6(r0, 0x0, 0x103, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 244.574697] XFS (loop1): device supports 512 byte sectors (not 0) 15:46:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000", 0x6e}], 0x0, 0x0) 15:46:27 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:27 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:27 executing program 5: [ 244.902446] XFS (loop1): SB sanity check failed [ 244.913319] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 244.930217] XFS (loop1): Unmount and run xfs_repair [ 244.935396] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 244.956727] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 244.968470] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... [ 244.977464] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 244.985745] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 244.993993] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 245.002325] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 245.010517] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 245.018668] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 245.026871] XFS (loop1): SB validate failed with error -117. 15:46:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000340)) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x50, &(0x7f0000000200)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000bc0)=0xb76) 15:46:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) socket$l2tp(0x18, 0x1, 0x1) recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:27 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x4, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000", 0x6e}], 0x0, 0x0) 15:46:27 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:27 executing program 5: 15:46:28 executing program 5: 15:46:28 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00', 0x0, 0x81}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) [ 245.492008] XFS (loop1): SB sanity check failed 15:46:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 245.512379] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 245.535636] XFS (loop1): Unmount and run xfs_repair 15:46:28 executing program 5: 15:46:28 executing program 4: [ 245.566792] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 245.578778] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 15:46:28 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1000000000000147, &(0x7f0000121000), 0x34b, 0x0) 15:46:28 executing program 4: [ 245.610805] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... [ 245.641034] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 245.664740] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 245.690811] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 245.732138] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 245.753808] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 245.779257] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 245.792439] XFS (loop1): SB validate failed with error -117. 15:46:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) socket$l2tp(0x18, 0x1, 0x1) recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:28 executing program 5: 15:46:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:28 executing program 4: 15:46:28 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000121000), 0x0, 0x0) 15:46:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000", 0x6e}], 0x0, 0x0) 15:46:28 executing program 5: 15:46:28 executing program 4: [ 246.335479] XFS (loop1): SB sanity check failed 15:46:29 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000121000), 0x0, 0x0) 15:46:29 executing program 5: 15:46:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 246.363203] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 15:46:29 executing program 4: [ 246.445919] XFS (loop1): Unmount and run xfs_repair [ 246.470371] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 246.511014] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 246.519491] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... [ 246.528302] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 246.580246] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 246.591847] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 246.606665] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 246.615450] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 246.623872] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 246.632157] XFS (loop1): SB validate failed with error -117. 15:46:29 executing program 5: 15:46:29 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000121000), 0x0, 0x0) 15:46:29 executing program 4: 15:46:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000000000000000000000", 0x76}], 0x0, 0x0) 15:46:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) socket$l2tp(0x18, 0x1, 0x1) recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:29 executing program 4: 15:46:29 executing program 5: 15:46:29 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100), 0x0, &(0x7f0000121000), 0x0, 0x0) 15:46:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 247.225897] XFS (loop1): SB sanity check failed [ 247.259774] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 15:46:29 executing program 4: [ 247.316313] XFS (loop1): Unmount and run xfs_repair 15:46:30 executing program 5: 15:46:30 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100), 0x0, &(0x7f0000121000), 0x0, 0x0) 15:46:30 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 247.341604] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 247.349677] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 247.372822] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... 15:46:30 executing program 5: 15:46:30 executing program 4: [ 247.400509] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 247.439715] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 247.491686] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 247.520999] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 247.554996] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 247.579172] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 247.611679] XFS (loop1): SB validate failed with error -117. 15:46:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:30 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100), 0x0, &(0x7f0000121000), 0x0, 0x0) 15:46:30 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:30 executing program 4: 15:46:30 executing program 5: 15:46:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000000000000000000000", 0x76}], 0x0, 0x0) 15:46:30 executing program 4: 15:46:30 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000121000), 0x0, 0x0) 15:46:30 executing program 5: 15:46:30 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:30 executing program 4: [ 248.179120] XFS (loop1): SB sanity check failed [ 248.187995] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 15:46:30 executing program 5: [ 248.238898] XFS (loop1): Unmount and run xfs_repair [ 248.251213] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 248.280402] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 248.297815] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... [ 248.313514] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 248.338105] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 248.366095] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 248.375470] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 248.383921] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 248.392165] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 248.400368] XFS (loop1): SB validate failed with error -117. 15:46:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:31 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000121000), 0x0, 0x0) 15:46:31 executing program 4: 15:46:31 executing program 5: 15:46:31 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000000000000000000000", 0x76}], 0x0, 0x0) 15:46:31 executing program 4: 15:46:31 executing program 5: 15:46:31 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:31 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000121000), 0x0, 0x0) [ 248.981930] XFS (loop1): SB sanity check failed [ 248.986977] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 15:46:31 executing program 4: [ 249.045115] XFS (loop1): Unmount and run xfs_repair [ 249.057945] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 249.073819] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 15:46:31 executing program 5: [ 249.116681] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... [ 249.159411] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 249.210121] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 249.237119] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 249.247706] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 249.256232] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 249.264811] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 249.273736] XFS (loop1): SB validate failed with error -117. 15:46:32 executing program 4: 15:46:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 15:46:32 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) 15:46:32 executing program 5: 15:46:32 executing program 5: 15:46:32 executing program 4: 15:46:32 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) 15:46:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:32 executing program 5: [ 249.893184] XFS (loop1): SB sanity check failed [ 249.898028] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 249.940145] XFS (loop1): Unmount and run xfs_repair [ 249.945415] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 249.970381] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 15:46:32 executing program 5: 15:46:32 executing program 4: 15:46:32 executing program 2: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x0, @multicast2, 0x0, 0x0, 'sh\x00'}, 0x2c) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f00000007c0)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) [ 249.985460] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... [ 250.040261] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 250.077081] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 250.098750] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 250.114120] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 250.136797] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 250.158524] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 250.169814] XFS (loop1): SB validate failed with error -117. 15:46:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:33 executing program 4: 15:46:33 executing program 5: 15:46:33 executing program 2: 15:46:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 15:46:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000004e40)=[{&(0x7f00000013c0)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000001400)="a9", 0x1}], 0x1}], 0x1, 0x40) 15:46:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x20000000304, @dev}, 0x0, {0x2, 0x0, @multicast1}, "697000000000ffffffff00"}) 15:46:33 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003040200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 15:46:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) acct(0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) [ 250.838433] XFS (loop1): SB sanity check failed [ 250.843549] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 15:46:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:33 executing program 2: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003e00f45b00000000000000000000"], 0x2a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 15:46:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) [ 250.903875] XFS (loop1): Unmount and run xfs_repair [ 250.909080] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 250.940711] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 15:46:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x20000000304, @dev}, 0x0, {0x2, 0x0, @multicast1}, "697000000000ffffffff00"}) [ 250.962173] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... [ 250.976586] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 250.997311] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 251.053146] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 251.088216] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 251.101535] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 251.110569] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 251.118941] XFS (loop1): SB validate failed with error -117. 15:46:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000020000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 15:46:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xffffff7d) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") recvmsg(r1, &(0x7f00000009c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/119, 0x7ffff000}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f0000000980)=""/55, 0x37}, 0x0) 15:46:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x20000000304, @dev}, 0x0, {0x2, 0x0, @multicast1}, "697000000000ffffffff00"}) 15:46:33 executing program 2: timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x14) 15:46:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 15:46:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) acct(0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) [ 251.342372] ================================================================== [ 251.350119] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 251.356636] Read of size 8 at addr ffff8881cce7f8f0 by task syz-executor5/9084 [ 251.364004] [ 251.365651] CPU: 0 PID: 9084 Comm: syz-executor5 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 251.374149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.383519] Call Trace: [ 251.386217] dump_stack+0x244/0x39d [ 251.389896] ? dump_stack_print_info.cold.1+0x20/0x20 [ 251.395157] ? printk+0xa7/0xcf [ 251.395195] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 251.395246] print_address_description.cold.4+0x9/0x1ff [ 251.395263] ? __list_add_valid+0x8f/0xac [ 251.395277] kasan_report.cold.5+0x1b/0x39 [ 251.395291] ? __list_add_valid+0x8f/0xac [ 251.403557] ? rt_dst_alloc+0x3f0/0x540 [ 251.403578] ? __list_add_valid+0x8f/0xac [ 251.417346] __asan_report_load8_noabort+0x14/0x20 [ 251.417366] __list_add_valid+0x8f/0xac [ 251.417456] ___neigh_create+0x14b7/0x2600 [ 251.417489] ? ip_route_output_key_hash_rcu+0x10d7/0x3490 [ 251.417509] ? neigh_remove_one+0x5a0/0x5a0 [ 251.417562] ? find_held_lock+0x36/0x1c0 [ 251.425810] ? mark_held_locks+0xc7/0x130 [ 251.425885] ? __local_bh_enable_ip+0x160/0x260 [ 251.425904] ? __local_bh_enable_ip+0x160/0x260 [ 251.470527] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 251.475181] ? trace_hardirqs_on+0xbd/0x310 [ 251.479527] ? neigh_lookup+0x586/0x7c0 [ 251.483529] ? trace_hardirqs_off_caller+0x310/0x310 [ 251.488886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.494446] ? check_preemption_disabled+0x48/0x280 [ 251.499518] ? neigh_lookup+0x553/0x7c0 [ 251.503507] ? neigh_lookup+0x553/0x7c0 [ 251.507492] ? __local_bh_enable_ip+0x160/0x260 [ 251.512192] ? neigh_lookup+0x586/0x7c0 [ 251.516330] ? arp_hash+0xa0/0xa0 [ 251.519815] ? neigh_seq_start+0x770/0x770 [ 251.524066] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 251.529622] ? find_held_lock+0x36/0x1c0 [ 251.533705] __neigh_create+0x30/0x40 [ 251.537524] arp_req_set+0x59d/0xaa0 [ 251.541250] ? arp_req_delete+0x870/0x870 [ 251.545531] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 251.550311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.555864] arp_ioctl+0x48b/0xae0 [ 251.559405] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 251.564613] ? arp_constructor+0xd80/0xd80 [ 251.568924] ? futex_wake+0x304/0x760 [ 251.572728] inet_ioctl+0x237/0x360 [ 251.576372] ? inet_stream_connect+0xa0/0xa0 [ 251.580865] ? mark_held_locks+0x130/0x130 [ 251.585101] ? graph_lock+0x270/0x270 [ 251.588897] ? do_futex+0x249/0x26d0 [ 251.592650] ? kmem_cache_alloc_trace+0x356/0x740 [ 251.597503] ? __lockdep_init_map+0x105/0x590 [ 251.602016] ? lockdep_init_map+0x9/0x10 [ 251.606084] ? find_held_lock+0x36/0x1c0 [ 251.610300] sock_do_ioctl+0xeb/0x420 [ 251.614103] ? compat_ifr_data_ioctl+0x170/0x170 [ 251.618846] ? check_preemption_disabled+0x48/0x280 [ 251.623866] ? kasan_check_read+0x11/0x20 [ 251.628085] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 251.633397] ? rcu_read_unlock_special+0x370/0x370 [ 251.638339] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 251.643535] sock_ioctl+0x313/0x690 [ 251.647152] ? dlci_ioctl_set+0x40/0x40 [ 251.651178] ? ksys_dup3+0x680/0x680 [ 251.654944] ? __might_fault+0x12b/0x1e0 [ 251.658999] ? lock_downgrade+0x900/0x900 [ 251.663085] XFS (loop1): SB sanity check failed [ 251.663148] ? lock_release+0xa00/0xa00 [ 251.668188] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 251.671906] ? perf_trace_sched_process_exec+0x860/0x860 [ 251.671933] ? dlci_ioctl_set+0x40/0x40 [ 251.671950] do_vfs_ioctl+0x1de/0x1790 [ 251.671973] ? ioctl_preallocate+0x300/0x300 [ 251.671989] ? __fget_light+0x2e9/0x430 [ 251.672005] ? fget_raw+0x20/0x20 [ 251.672025] ? _copy_to_user+0xc8/0x110 [ 251.685456] XFS (loop1): Unmount and run xfs_repair [ 251.688587] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 251.688706] ? put_timespec64+0x10f/0x1b0 [ 251.688726] ? nsecs_to_jiffies+0x30/0x30 [ 251.693475] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 251.696611] ? do_syscall_64+0x9a/0x820 15:46:34 executing program 2: r0 = semget(0x3, 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x9, &(0x7f0000000140)) [ 251.696629] ? do_syscall_64+0x9a/0x820 [ 251.696648] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 251.696700] ? security_file_ioctl+0x94/0xc0 [ 251.696721] ksys_ioctl+0xa9/0xd0 [ 251.701940] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 251.705094] __x64_sys_ioctl+0x73/0xb0 [ 251.705114] do_syscall_64+0x1b9/0x820 [ 251.705193] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 251.705214] ? syscall_return_slowpath+0x5e0/0x5e0 [ 251.708939] 00000010: 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 ...... ......... 15:46:34 executing program 2: r0 = semget(0x3, 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x9, &(0x7f0000000140)) [ 251.712622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.712643] ? trace_hardirqs_on_caller+0x310/0x310 [ 251.712662] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 251.712681] ? prepare_exit_to_usermode+0x291/0x3b0 [ 251.712702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.712725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.712737] RIP: 0033:0x457679 15:46:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 251.712782] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.712792] RSP: 002b:00007fe0e5384c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 251.712808] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 251.712822] RDX: 0000000020000000 RSI: 0000000000008955 RDI: 0000000000000003 [ 251.718793] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 251.723351] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 251.723360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0e53856d4 15:46:34 executing program 2: r0 = semget(0x3, 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x9, &(0x7f0000000140)) [ 251.723369] R13: 00000000004c2730 R14: 00000000004d46a8 R15: 00000000ffffffff [ 251.723394] [ 251.723402] Allocated by task 9063: [ 251.723423] save_stack+0x43/0xd0 [ 251.723438] kasan_kmalloc+0xcb/0xd0 [ 251.723453] __kmalloc+0x15d/0x760 [ 251.723468] ___neigh_create+0x13fc/0x2600 [ 251.723481] __neigh_create+0x30/0x40 [ 251.723497] arp_req_set+0x59d/0xaa0 [ 251.723510] arp_ioctl+0x48b/0xae0 [ 251.723521] inet_ioctl+0x237/0x360 [ 251.723532] sock_do_ioctl+0xeb/0x420 [ 251.723541] sock_ioctl+0x313/0x690 [ 251.723554] do_vfs_ioctl+0x1de/0x1790 [ 251.723571] ksys_ioctl+0xa9/0xd0 [ 251.728727] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 251.731855] __x64_sys_ioctl+0x73/0xb0 [ 251.731871] do_syscall_64+0x1b9/0x820 [ 251.731887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.731892] [ 251.731899] Freed by task 16: [ 251.731914] save_stack+0x43/0xd0 [ 251.731930] __kasan_slab_free+0x102/0x150 [ 251.731941] kasan_slab_free+0xe/0x10 [ 251.731955] kfree+0xcf/0x230 [ 251.731969] rcu_process_callbacks+0xd91/0x15f0 [ 251.731984] __do_softirq+0x308/0xb7e [ 251.731987] [ 251.731998] The buggy address belongs to the object at ffff8881cce7f680 [ 251.731998] which belongs to the cache kmalloc-1k of size 1024 [ 251.732011] The buggy address is located 624 bytes inside of [ 251.732011] 1024-byte region [ffff8881cce7f680, ffff8881cce7fa80) [ 251.732021] The buggy address belongs to the page: [ 251.739736] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 251.742654] page:ffffea0007339f80 count:1 mapcount:0 mapping:ffff8881da800ac0 index:0x0 compound_mapcount: 0 [ 251.742683] flags: 0x2fffc0000010200(slab|head) [ 251.742706] raw: 02fffc0000010200 ffffea00071c6088 ffffea000707d088 ffff8881da800ac0 [ 251.742729] raw: 0000000000000000 ffff8881cce7e000 0000000100000007 0000000000000000 [ 251.742736] page dumped because: kasan: bad access detected [ 251.742740] [ 251.742747] Memory state around the buggy address: [ 251.742777] ffff8881cce7f780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 251.742789] ffff8881cce7f800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 251.742801] >ffff8881cce7f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 251.742808] ^ [ 251.742820] ffff8881cce7f900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 251.742831] ffff8881cce7f980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 251.742839] ================================================================== [ 251.742850] Disabling lock debugging due to kernel taint [ 251.747451] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 251.756845] kobject: 'loop2' (000000008f63453b): kobject_uevent_env [ 251.760984] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 251.778104] kobject: 'loop2' (000000008f63453b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 251.781461] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 251.811845] Kernel panic - not syncing: panic_on_warn set ... [ 251.830806] XFS (loop1): SB validate failed with error -117. [ 251.846496] CPU: 0 PID: 9084 Comm: syz-executor5 Tainted: G B 4.20.0-rc6-next-20181210+ #164 [ 251.846503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.846508] Call Trace: [ 251.846533] dump_stack+0x244/0x39d [ 251.846551] ? dump_stack_print_info.cold.1+0x20/0x20 [ 251.846571] ? __list_add_valid+0x10/0xac [ 251.846661] panic+0x2ad/0x632 [ 251.846681] ? add_taint.cold.5+0x16/0x16 [ 252.229420] ? preempt_schedule+0x4d/0x60 [ 252.233575] ? ___preempt_schedule+0x16/0x18 [ 252.237969] ? trace_hardirqs_on+0xb4/0x310 [ 252.242282] ? __list_add_valid+0x8f/0xac [ 252.246424] end_report+0x47/0x4f [ 252.249862] kasan_report.cold.5+0xe/0x39 [ 252.254006] ? __list_add_valid+0x8f/0xac [ 252.258158] ? rt_dst_alloc+0x3f0/0x540 [ 252.262116] ? __list_add_valid+0x8f/0xac [ 252.266254] __asan_report_load8_noabort+0x14/0x20 [ 252.271225] __list_add_valid+0x8f/0xac [ 252.275215] ___neigh_create+0x14b7/0x2600 [ 252.279457] ? ip_route_output_key_hash_rcu+0x10d7/0x3490 [ 252.284989] ? neigh_remove_one+0x5a0/0x5a0 [ 252.289303] ? find_held_lock+0x36/0x1c0 [ 252.293352] ? mark_held_locks+0xc7/0x130 [ 252.297498] ? __local_bh_enable_ip+0x160/0x260 [ 252.302168] ? __local_bh_enable_ip+0x160/0x260 [ 252.306827] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 252.311397] ? trace_hardirqs_on+0xbd/0x310 [ 252.315724] ? neigh_lookup+0x586/0x7c0 [ 252.319699] ? trace_hardirqs_off_caller+0x310/0x310 [ 252.324804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.330327] ? check_preemption_disabled+0x48/0x280 [ 252.335336] ? neigh_lookup+0x553/0x7c0 [ 252.339308] ? neigh_lookup+0x553/0x7c0 [ 252.343273] ? __local_bh_enable_ip+0x160/0x260 [ 252.347929] ? neigh_lookup+0x586/0x7c0 [ 252.351891] ? arp_hash+0xa0/0xa0 [ 252.355329] ? neigh_seq_start+0x770/0x770 [ 252.359549] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 252.365072] ? find_held_lock+0x36/0x1c0 [ 252.369122] __neigh_create+0x30/0x40 [ 252.372915] arp_req_set+0x59d/0xaa0 [ 252.376628] ? arp_req_delete+0x870/0x870 [ 252.380789] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 252.385542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.391100] arp_ioctl+0x48b/0xae0 [ 252.394698] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 252.399899] ? arp_constructor+0xd80/0xd80 [ 252.404130] ? futex_wake+0x304/0x760 [ 252.407934] inet_ioctl+0x237/0x360 [ 252.411548] ? inet_stream_connect+0xa0/0xa0 [ 252.415948] ? mark_held_locks+0x130/0x130 [ 252.420169] ? graph_lock+0x270/0x270 [ 252.423955] ? do_futex+0x249/0x26d0 [ 252.427686] ? kmem_cache_alloc_trace+0x356/0x740 [ 252.432523] ? __lockdep_init_map+0x105/0x590 [ 252.437006] ? lockdep_init_map+0x9/0x10 [ 252.441052] ? find_held_lock+0x36/0x1c0 [ 252.445104] sock_do_ioctl+0xeb/0x420 [ 252.448891] ? compat_ifr_data_ioctl+0x170/0x170 [ 252.453631] ? check_preemption_disabled+0x48/0x280 [ 252.458648] ? kasan_check_read+0x11/0x20 [ 252.462791] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 252.468064] ? rcu_read_unlock_special+0x370/0x370 [ 252.472999] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 252.478241] sock_ioctl+0x313/0x690 [ 252.481866] ? dlci_ioctl_set+0x40/0x40 [ 252.485840] ? ksys_dup3+0x680/0x680 [ 252.489552] ? __might_fault+0x12b/0x1e0 [ 252.493614] ? lock_downgrade+0x900/0x900 [ 252.497749] ? lock_release+0xa00/0xa00 [ 252.501746] ? perf_trace_sched_process_exec+0x860/0x860 [ 252.507213] ? dlci_ioctl_set+0x40/0x40 [ 252.511176] do_vfs_ioctl+0x1de/0x1790 [ 252.515090] ? ioctl_preallocate+0x300/0x300 [ 252.519527] ? __fget_light+0x2e9/0x430 [ 252.523519] ? fget_raw+0x20/0x20 [ 252.526957] ? _copy_to_user+0xc8/0x110 [ 252.530930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.536473] ? put_timespec64+0x10f/0x1b0 [ 252.540667] ? nsecs_to_jiffies+0x30/0x30 [ 252.544819] ? do_syscall_64+0x9a/0x820 [ 252.548790] ? do_syscall_64+0x9a/0x820 [ 252.552783] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 252.557365] ? security_file_ioctl+0x94/0xc0 [ 252.561803] ksys_ioctl+0xa9/0xd0 [ 252.565258] __x64_sys_ioctl+0x73/0xb0 [ 252.569137] do_syscall_64+0x1b9/0x820 [ 252.573013] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 252.578380] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.583307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.588154] ? trace_hardirqs_on_caller+0x310/0x310 [ 252.593164] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.598164] ? prepare_exit_to_usermode+0x291/0x3b0 [ 252.603167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.608023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.613197] RIP: 0033:0x457679 [ 252.616376] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.635271] RSP: 002b:00007fe0e5384c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 252.642970] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 252.650226] RDX: 0000000020000000 RSI: 0000000000008955 RDI: 0000000000000003 [ 252.657490] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 252.664752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0e53856d4 [ 252.672036] R13: 00000000004c2730 R14: 00000000004d46a8 R15: 00000000ffffffff [ 252.680396] Kernel Offset: disabled [ 252.684021] Rebooting in 86400 seconds..