fs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1000000000}) 00:08:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 00:08:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 943.712807] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 00:08:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntft\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 943.943868] XFS (loop1): Invalid superblock magic number 00:08:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x60000000}) 00:08:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 00:08:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000400"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) [ 944.129663] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 944.235401] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntf.\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 944.519961] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 00:08:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 944.644942] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 944.675703] XFS (loop1): Invalid superblock magic number 00:08:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc4}) 00:08:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfp\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 00:08:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 944.950466] XFS (loop1): unknown mount option [Ä]. 00:08:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 945.022282] XFS (loop1): unknown mount option [Ä]. 00:08:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 00:08:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfr\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7a}) 00:08:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 00:08:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000200"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 945.342017] XFS (loop1): unknown mount option [z]. [ 945.376284] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 00:08:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntf+\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xd00000000000000}) 00:08:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 00:08:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 00:08:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 945.831050] XFS (loop1): Invalid superblock magic number 00:08:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfo\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x441}, 0x0) 00:08:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x500000000000000}) 00:08:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) 00:08:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 00:08:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000400"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 946.389729] XFS (loop1): Invalid superblock magic number 00:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xc00e000000000000}, 0x0) 00:08:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000400"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1f000000}) 00:08:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 00:08:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 00:08:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsk', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) [ 946.944663] XFS (loop1): Invalid superblock magic number 00:08:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7a00}) 00:08:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 00:08:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs3', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) 00:08:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 947.430107] XFS (loop1): Invalid superblock magic number 00:08:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) 00:08:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs3', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xf}) 00:08:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667381", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x4104000000000000}, 0x0) 00:08:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 947.797836] XFS (loop1): unknown mount option []. 00:08:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) 00:08:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667313", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000200"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 947.894008] XFS (loop1): unknown mount option []. 00:08:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 00:08:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4c}) 00:08:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\b', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 948.111106] XFS (loop1): unknown mount option [L]. 00:08:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x41040000}, 0x0) 00:08:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x9}) 00:08:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000400"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667302", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 00:08:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 948.492829] XFS (loop1): unknown mount option [ ]. 00:08:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 948.593053] __ntfs_error: 15 callbacks suppressed [ 948.593065] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 00:08:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7b0c000000000000}) 00:08:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 948.742719] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 948.845525] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 948.943508] XFS (loop1): Invalid superblock magic number [ 948.961589] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 949.002979] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 949.016796] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 00:08:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8003000000000000}) 00:08:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 00:08:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 949.376248] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 949.459860] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673f6", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 949.545050] XFS (loop1): Invalid superblock magic number 00:08:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 00:08:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6b6b6b}) 00:08:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 949.731505] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 949.829965] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 949.910557] XFS (loop1): unknown mount option [k]. 00:08:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 949.994804] XFS (loop1): unknown mount option [k]. 00:08:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000200"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x81020000}) 00:08:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 00:08:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfst', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x2000000000000000}, 0x0) [ 950.396266] XFS (loop1): Invalid superblock magic number 00:08:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 00:08:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x700}) 00:08:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673fd", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 00:08:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 00:08:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 950.946071] XFS (loop1): Invalid superblock magic number 00:08:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x16}) 00:08:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) 00:08:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673fd", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 951.297952] XFS (loop1): unknown mount option []. 00:08:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x200000000000000}) 00:08:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 951.655120] XFS (loop1): Invalid superblock magic number 00:08:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffff1f00}) 00:08:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 952.054381] XFS (loop1): Invalid superblock magic number 00:08:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x80020000}) 00:08:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e7466737f", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000005"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667303", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 952.493761] XFS (loop1): Invalid superblock magic number 00:08:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xedc0}) 00:08:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000001"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 952.859130] XFS (loop1): unknown mount option [À]. [ 952.942551] XFS (loop1): unknown mount option [À]. 00:08:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7b0c}) 00:08:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e7466738c", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 953.205398] XFS (loop1): unknown mount option [ ]. 00:08:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\f', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 953.319268] XFS (loop1): unknown mount option [ ]. 00:08:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6000}) 00:08:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000200"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 953.704928] XFS (loop1): Invalid superblock magic number 00:08:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 953.767791] __ntfs_error: 28 callbacks suppressed [ 953.767800] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 953.830834] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xff0f0000}) 00:08:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 953.903158] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000002"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 954.032944] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 954.156804] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000004"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 954.197853] XFS (loop1): Invalid superblock magic number 00:08:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 954.281799] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 954.293071] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x22}) 00:08:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 954.478363] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 954.592544] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000003"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 954.664903] XFS (loop1): unknown mount option ["]. [ 954.707697] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 954.762661] XFS (loop1): unknown mount option ["]. 00:08:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3}) 00:08:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000006"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667313", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 955.069804] XFS (loop1): unknown mount option []. 00:08:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 955.149770] XFS (loop1): unknown mount option []. 00:08:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4253465800000000}) 00:08:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a310000000000000000000000000000000000000000000000000000000000000000000000000400"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 955.517948] XFS (loop1): Invalid superblock magic number 00:08:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4800000000000000}) 00:08:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 955.936987] XFS (loop1): Invalid superblock magic number 00:08:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2000000000000}) 00:08:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 956.478165] XFS (loop1): Invalid superblock magic number 00:08:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffff1f0000000000}) 00:08:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667304", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 956.950360] XFS (loop1): Invalid superblock magic number 00:08:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 957.094818] XFS (loop1): Invalid superblock magic number 00:08:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3f000000}) 00:08:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 957.512876] XFS (loop1): Invalid superblock magic number 00:08:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8002}) 00:08:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000400"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 957.855190] XFS (loop1): unknown mount option []. 00:08:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 957.931022] XFS (loop1): unknown mount option []. 00:08:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x68}) 00:08:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 958.191508] XFS (loop1): unknown mount option [h]. 00:08:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 958.262399] XFS (loop1): unknown mount option [h]. 00:08:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8102000000000000}) 00:08:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 958.701479] XFS (loop1): Invalid superblock magic number 00:08:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 958.775230] __ntfs_error: 39 callbacks suppressed [ 958.775241] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 958.810296] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x5000000}) [ 958.881713] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 959.155101] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 959.218545] XFS (loop1): Invalid superblock magic number [ 959.255793] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 00:08:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667302", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffff3f}) 00:08:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 959.583026] XFS (loop1): unknown mount option [?]. 00:08:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xffffff7f00000000) 00:08:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 959.617805] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 959.682655] XFS (loop1): unknown mount option [?]. 00:08:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 959.745230] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xa0000000}) 00:08:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x9effffff) 00:08:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000200"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x2000000) 00:08:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a31000000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 960.011388] XFS (loop1): Invalid superblock magic number [ 960.084218] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xc00e) 00:08:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7}) 00:08:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 960.191692] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xfffffffffffff000) 00:08:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 960.399060] XFS (loop1): unknown mount option []. 00:08:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 960.457913] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 960.478354] XFS (loop1): unknown mount option []. 00:08:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfdfdffff00000000}) 00:08:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf00000000000000) 00:08:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xffffff7f) 00:08:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 960.840597] XFS (loop1): Invalid superblock magic number 00:08:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\a', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x30000}) 00:08:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x41040000) 00:08:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xec0) 00:08:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xc00e000000000000) 00:08:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 961.330166] XFS (loop1): Invalid superblock magic number 00:08:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfdfdffff}) 00:08:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf0ffff) 00:08:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x2000000000000000) [ 961.620462] XFS (loop1): unknown mount option [ÿ]. 00:08:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000200"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 961.699374] XFS (loop1): unknown mount option [ÿ]. 00:08:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x100000000000000) 00:08:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2300}) 00:08:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000400"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x3f00000000000000) 00:08:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 962.149137] XFS (loop1): Invalid superblock magic number 00:08:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xc00e0000) 00:08:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x1000000) 00:08:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x23}) [ 962.436005] XFS (loop1): unknown mount option [#]. 00:08:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xffffff9e) 00:08:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs"', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 962.521154] XFS (loop1): unknown mount option [#]. 00:08:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsH', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1fffff}) 00:08:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x2) 00:08:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x441) [ 962.856041] XFS (loop1): unknown mount option [ÿ]. 00:08:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000006"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 962.928052] XFS (loop1): unknown mount option [ÿ]. 00:08:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x40030000000000) 00:08:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8002000000000000}) 00:08:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x300000000000000) 00:08:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000500"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xfffff000) 00:08:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 963.417390] XFS (loop1): Invalid superblock magic number 00:08:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x400300) 00:08:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4c000000}) 00:08:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x3f00) 00:08:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667310", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 963.808140] XFS (loop1): Invalid superblock magic number 00:08:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x34000) [ 963.906191] XFS (loop1): Invalid superblock magic number 00:08:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x48000000}) 00:08:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x3) [ 964.034105] __ntfs_error: 32 callbacks suppressed [ 964.034116] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 964.172761] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x4104000000000000) [ 964.253095] XFS (loop1): Invalid superblock magic number 00:08:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000005"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 964.423620] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x200000000000000) 00:08:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000003"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xf00}) [ 964.485102] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 964.576276] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 964.600748] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x9effffff00000000) 00:08:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\a', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000300"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 964.716006] XFS (loop1): Invalid superblock magic number 00:08:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x3f000000) [ 964.889403] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x300000000000000}) 00:08:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf000000) 00:08:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 964.998408] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf000) 00:08:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 965.297526] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 965.309640] XFS (loop1): Invalid superblock magic number 00:08:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf) 00:08:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xfffffff0) 00:08:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6c00000000000000}) 00:08:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000600"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x4104) [ 965.687591] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf00) 00:08:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 965.804086] XFS (loop1): Invalid superblock magic number 00:08:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667302", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffff7f00000000}) 00:08:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x2000) 00:08:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf0ffffff) 00:08:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x3000000) [ 966.395528] XFS (loop1): Invalid superblock magic number 00:08:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x281}) 00:08:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf0ffffff00000000) 00:08:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 966.744750] XFS (loop1): unknown mount option []. 00:08:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf0ffffffffffff) 00:08:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000003"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffff97}) 00:08:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0xf0) 00:08:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000004"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 967.053140] XFS (loop1): unknown mount option [—]. 00:08:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x20000000) 00:08:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc802000000000000}) 00:08:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x300) 00:08:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff00000000003700000000000000639a8562b38f9b2e01b2e682d4908a1838d1e25a382f917ab10ee7bb4dc189"], 0x14}}, 0x0) 00:08:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs`', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 967.554909] XFS (loop1): Invalid superblock magic number 00:08:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x1, @ipv4={[], [], @remote}, 0x7fff}}, 0x7, 0x0, 0x9, 0x1, 0x800}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0xfff}, &(0x7f0000000300)=0x8) r3 = shmget(0x3, 0x4000, 0x80, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0xfffffffffffffff7, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r2, @in={{0x2, 0x4e23}}, 0x1f, 0x1000}, &(0x7f0000000400)=0x90) 00:08:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xf00000000000000}) 00:08:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs`', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10010, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x400, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, '}bdev[!'}}, {@access_any='access=any'}, {@nodevmap='nodevmap'}, {@access_any='access=any'}, {@fscache='fscache'}]}}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667304", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 968.038332] XFS (loop1): Invalid superblock magic number 00:08:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000080)=0xc5) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400dd000401ffff000000000000000000000000c520a31de5aa1de8164f1a79dce3a39fdfda7b4aff1e45b73ebb0ede6172c29c5c2eb7dadfe3727f3fa047d474fba2e0e78525a4e3ca0c693e12c2378ebdf9a27a5b5496e817851f1aafd469e71313f60f086877e07cc8144bf74db4e15f795825e7120fe76ff6f457ba446706db85ae8fe0effa515a9d0f2726a0d7b8353a2f8cffa881301a05be20cc4b7cfe562c664c30c9813ad61073439bdd731bbc9391e5cd1abe088c023f5c557915f8363d12c531388f73a85aa537ebda"], 0x14}}, 0x0) 00:08:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000005"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7400000000000000}) 00:08:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:49 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback, @in=@remote, 0x4e22, 0x4, 0x4e23, 0x8, 0xa, 0x80, 0x20, 0x3c, 0x0, r1}, {0xfffffffffffffff8, 0x0, 0x1, 0x20, 0x38, 0x4, 0x6, 0x3}, {0x6, 0xcbbe, 0x9, 0x80000001}, 0x3ff, 0x6e6bb0, 0x1, 0x0, 0x0, 0x3}, {{@in=@local, 0x4d3, 0x6c}, 0x2, @in=@multicast1, 0x34ff, 0x3, 0x1, 0x9, 0x6, 0x8, 0x6}}, 0xe8) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000380), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff040000000000000000000000"], 0x14}}, 0x0) 00:08:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667306", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000006"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000021180114000100000000000000000000009fca6d694884bb8b442257234083d42096e2a6442576954630333535cd207431d9302b2afe284cf6fb1bd8801e814ddacd651a40bd5254809278a9"], 0x14}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x389100, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x10000, 0x3, 0x80, &(0x7f0000ffc000/0x1000)=nil, 0xe2}) 00:08:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\t', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140001000400dfb2542cd030a9ab400000010000000000000001000000"], 0x14}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/net\x00') [ 968.640060] XFS (loop1): Invalid superblock magic number 00:08:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, "73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000002"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x600000000000000}) 00:08:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673c0", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:50 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000401ffff000000000000000000000000af5f9d6a02bd1d676d38e91373c16e668c865306af9bfe31ae2021b7c7c2884b71fcb26bf80b1509e8ddfb8e3e86b06ba4568bca71420b5d6528565efdffcefaa006f6675318bb9ac13e03a960"], 0x14}}, 0x0) 00:08:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000140)) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 969.016492] XFS (loop1): Invalid superblock magic number [ 969.071492] __ntfs_error: 23 callbacks suppressed [ 969.071504] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000010001ffff000000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000084) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2000, 0x0) r2 = memfd_create(&(0x7f0000000140)='\x00', 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r0, r2}) 00:08:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xf5ffffff00000000}) 00:08:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 969.306662] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, {0x1ffffd}}, 0x14}, 0x1, 0x0, 0x0, 0x100000}, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'dummy0\x00', 0x2}, 0x18) 00:08:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 969.429975] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 969.511498] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 969.567997] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 969.586371] XFS (loop1): Invalid superblock magic number 00:08:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101003, 0x1) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x84800) pipe2(&(0x7f0000000280), 0x84800) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000300)={r0}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000140), 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673f6", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfdffffff00000000}) 00:08:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="ff000000000000000000000000"], 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={r1, r2/1000+30000}, 0x10) [ 969.853571] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 969.987553] audit: type=1400 audit(1537574931.555:39): avc: denied { setopt } for pid=8222 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:08:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673fc", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x404000, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000380)={"6e3e7400000000000000000000f7ffffffffffffff00"}, &(0x7f0000000100)=0xfffffffffffffeee) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="c097947b10112faa9e8f6f602cd4d72ea8db4d2a9cd37f102b9786d72e7948be0c72ff7f000000000000850f6d534688ee3242c591fc3e279fb3be1b2c2f65d4603d2baff9ef0fdab96e9422c6cac847e01fab351885bae45c6a000e7b27fd7899a0c13e88d6f84c"], 0x14}}, 0x0) 00:08:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 970.040850] XFS (loop1): Invalid superblock magic number 00:08:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x20000}) [ 970.241774] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 00:08:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 970.366393] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:52 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @pic={0x40, 0x6, 0x80000000, 0x9, 0x0, 0x7fffffff, 0x100000001, 0x4, 0x100, 0x80000001, 0xffffffffffff5079, 0x8, 0x9, 0x3, 0x6, 0xffffffffffffff5d}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000000401ffff000000000000008000ee63ce6ebb20339e0acd0ef09577925dd53563b7549f9ce4b2000000"], 0x14}}, 0x1) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000280)={0x7, 0x2, 0xc4, 0x3}, 0x10) creat(&(0x7f00000002c0)='./file0\x00', 0x10) signalfd4(r1, &(0x7f0000000040)={0xedae}, 0x8, 0x80800) 00:08:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 970.413013] XFS (loop1): Invalid superblock magic number 00:08:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x23000000}) 00:08:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000140)='ppp0system+\x00', 0xffffffffffffffff}, 0x30) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100102}, 0xffffffffffffff64, &(0x7f00000002c0)={&(0x7f0000000300)={0x14, 0x4, 0x1, 0x100, 0x0, 0x10000000000, {}, [@nested={0x0, 0x53, [@generic="1d0724a45be153e9ebfd7806c73e66eda007ff5b4d4245798d275ba13762a1d4bd11d61626e25de8e57d48a38307f836c3b9ae9ec79ece1c823c82ba367bff60256eaeb0fbef74f9b12747618e405a8a19d9b13505b4f3a02f5122dc6b5e151557489f2f8407f2667f50223135ebe0ce415e80edc474dba5ebf18c89ed9f1d35"]}, @nested={0x0, 0x61, [@generic="8c64c7243e4d93429589bc27d1b67c73e84dab7ab2570996b64478703c3e97fb0c3cb5afa7162e3f6b7c29443aa2a7dfbd3d78fc824087ab40d864d12d6025c1573013e0faa9ba84494d1ac7f59bffdfb94972473518de24bd458ce7e0cefbba48856da08d48f45e3aa93eb14b51aca29729d6815dc4e76eb7a9e4359092d089f6974b0eaad3b85bed004038825500cb7345d564ddeae31dac38c98ee7f81c86baccf877cd831557ad2b85d8d9b8cca8d99805cb020bbaa8ab27c90d23cb26c4fe1fbab722893316813771b116b8563e456402e4"]}]}, 0x14}}, 0x0) 00:08:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 970.641104] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667306", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:52 executing program 5: r0 = msgget(0x3, 0x454e9b6826da1b0c) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000140)=""/254) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401cd9c16ead35530e38ea0e91406e1"], 0x14}}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40840, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x101, 0x8000) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x90000, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000002c0)={r3, 0x3, 0xd0, r4}) 00:08:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x7000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 970.943337] XFS (loop1): Invalid superblock magic number 00:08:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80080, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0xa625) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0x124, 0x2}, 0x14}}, 0x0) 00:08:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4c00}) 00:08:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsH', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x1000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ff699f26fec6b57ade0000000000"], 0x14}}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x401, 0x80080) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000001c0)) sendmsg$unix(r1, &(0x7f0000001340)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="f98d27591ce86217bf5c79f63bd3a4d0b406fb406c5873a983aec331fca18f69fcdfb68b8d808cf4fe7729e83a3cf0c276cd2df154e76116754f6fefe295e818f329524225eb9790b1f222e4da6650474767776557fd9ba53ce0d5b4d9f3975f85bd75018983cc2552fa0998d03556f1474c27c1097d26815fd505763b77676fec4deb2346fe8852daa770574b5404c6db11c2dd643077b3d126aa2c41b610762b5e67b49cddb16cdc35e365b0d142843f23fa8c3e6193c852cdd9318a3177f06b4cb73998be1af977b9aff402aa8008dd45c0befafabcac1dfc1d5b", 0xdc}], 0x3, 0x0, 0x0, 0x4000000}, 0x4000000) 00:08:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x3000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x125402, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x1ee) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x8, 0x1, 0x3, 0x0, 0x4}, 0x14}}, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000180)={0x7b, 0x0, [0x3, 0xffffffff, 0x3ff, 0xffffffffffff0000]}) [ 971.443792] XFS (loop1): Invalid superblock magic number 00:08:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x6000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8102}) 00:08:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0xe, 0xd7, &(0x7f0000000140)="af3baccf000ad38efcb740c5fdf2", &(0x7f0000000180)=""/215, 0xca}, 0x28) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401fffe000400000000000000000000"], 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x4}, &(0x7f0000000300)=0x8) socketpair(0x7, 0x1, 0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000003c0)=0x2) r3 = getpgid(0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x29, 0x37, 0x2, {0x3, 0xfff, 0x8, r3, 0xb, '/dev/mixer\x00'}}, 0x29) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340)={r1, 0x1ff, 0x29e, 0x3, 0x800, 0x3dc}, 0x14) 00:08:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x500}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 971.856375] XFS (loop1): unknown mount option []. 00:08:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x181001, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000180)={0x20, 0x0, 0x8, {0x0, 0x2}}, 0x20) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x882, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000100)) syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000280)='./file0\x00', 0x40, 0x0, &(0x7f00000002c0), 0x10, &(0x7f0000000300)={[{@statfs_percent={'statfs_percent', 0x3d, 0x40}}, {@lockproto_dlm='lockproto=dlm'}, {@norecovery='norecovery'}, {@nodiscard='nodiscard'}]}) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x7) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={0x0, @remote, @rand_addr}, &(0x7f0000000200)=0xc) [ 971.928642] XFS (loop1): unknown mount option []. 00:08:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6c00}) [ 972.058001] QAT: Invalid ioctl 00:08:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 972.174744] gfs2: not a GFS2 filesystem [ 972.232748] QAT: Invalid ioctl [ 972.254204] gfs2: not a GFS2 filesystem 00:08:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x4000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000043f00cd070000000000009200000000a168b25573ace92f59bc37c40555289434a4433c1cfea060297bc3eb196b"], 0x14}}, 0x0) [ 972.357498] XFS (loop1): Invalid superblock magic number 00:08:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0x0]) getgroups(0x3, &(0x7f0000000340)=[0xffffffffffffffff, 0xee00, 0x0]) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x4}, [{0x2, 0x7, r1}, {0x2, 0x4, r2}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x1, r4}]}, 0x44, 0x0) 00:08:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x300}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xa0}) 00:08:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xffffffffffffffe1, 0x4200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0x3, 0x3, 0xfffffffffffffffa, 0x0, 0x142}}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000f500ff00000000000000000000000000"], 0x14}}, 0x0) 00:08:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 972.731297] XFS (loop1): unknown mount option [ ]. 00:08:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 972.825764] XFS (loop1): unknown mount option [ ]. 00:08:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0x0, 0x2) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000140)) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x1, 0x1, 0xffffffffffffffff}, 0x14}}, 0xfffffffffffffffc) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)=0x400, 0x4) 00:08:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xe00}) 00:08:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667303", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:54 executing program 5: socketpair(0x5, 0x7, 0x100000000, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:08:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x300000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 973.278918] XFS (loop1): Invalid superblock magic number 00:08:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff000000230000000000000000"], 0x14}}, 0x0) 00:08:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs,', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x58465342}) 00:08:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'dummy0\x00'}) 00:08:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x400000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 973.557910] XFS (loop1): unknown mount option [B]. [ 973.611203] XFS (loop1): unknown mount option [B]. 00:08:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsu', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffff8c}) 00:08:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x2000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs"', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:55 executing program 5: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000a00)={0x7, &(0x7f0000000400)=""/27, &(0x7f0000000940)=[{0xfffffffffffffff9, 0xe0, 0xfff, &(0x7f0000000440)=""/224}, {0xffff, 0xf7, 0xfffffffffffffffd, &(0x7f0000000540)=""/247}, {0x3, 0x56, 0xf18, &(0x7f0000000640)=""/86}, {0x9, 0x6d, 0x101, &(0x7f00000006c0)=""/109}, {0xe6e8, 0x40, 0x6, &(0x7f0000000740)=""/64}, {0x401, 0xeb, 0x9, &(0x7f0000000780)=""/235}, {0x101, 0xac, 0x3, &(0x7f0000000880)=""/172}]}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4f, "8bf49db26eab1a828f2c7a53039782bc6ae874afc5a0d107e42f2941bbe22a258bcb3c6c07844dc13b0914408813db7f6add4129010911414e93728f4f4a44f6ebce07ae9c8c4cfb893da338b066a4"}, &(0x7f0000000380)=0x73) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x14100080}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xf0, r1, 0xa2c, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x10}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4004044}, 0xc004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000003c0)={0x80020, 0x4, 0x0, 0x8, 0x100000001, 0x8, 0x401}) sendmsg$nl_netfilter(r2, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[], 0xfffffffffffffc65}}, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000a40)=0x7) [ 973.916106] XFS (loop1): unknown mount option [Œ]. 00:08:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x5000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 974.007066] XFS (loop1): unknown mount option [Œ]. 00:08:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x100000000000000}) 00:08:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet(0x2, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f0000000180)=0x10) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) syz_extract_tcp_res(&(0x7f00000001c0), 0x8, 0x20) 00:08:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x600000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x800, 0x0) mq_getsetattr(r1, &(0x7f00000001c0)={0x9, 0x4, 0x9, 0x3, 0x5, 0x5, 0x7ff, 0x9}, &(0x7f0000000300)) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000401ffffe90000000000000000000023890a84c31a17970e45282539df9702f1bc010365f37e321e31f4132cd01909c09a298945a7b245b8bdb72b8eb733df921e6d24a2eb9b42cb672050f34edfd874e0839e9a26d620ae81242958c989d54ac89459044da08dddc096de244a4584a4a72bbfd7d6ded1953f43ae59218118acc4df880230b9e0207b3c1c7244ab5e338a602fb85c009354c7382c8916ca5a6818cc869ea000ef2a7a86e3220e058d0f37e3b684b8b5fab4c7f4fdabfc2faf9c"], 0x14}}, 0x0) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/netlink\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 974.335764] __ntfs_error: 26 callbacks suppressed [ 974.335774] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x700000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 974.394665] XFS (loop1): Invalid superblock magic number 00:08:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x500000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:56 executing program 5: r0 = memfd_create(&(0x7f0000000080)='cgroupppp1\x00', 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000140)={0x40, 0x0, 0x10001, 0x5}) read$eventfd(r0, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0x0, r1, 0x10000, 0x4}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0xf, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xd000000}) 00:08:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 974.721425] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 974.733305] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000640)=0xffff, 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000780)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000300)="afb6bbfa61c734c0e2ab4d5c8a947dd31a1b0ec1dedc19191036281b09f3b6658fb39682c7c313bd71003fc99541de2c1609ea19f2feb352f6ccd8a92b4692f51002563ff70e9558c8dd7ae4913212c4c10dd205070abff187dbb9b56c4e8e99f92bf7aa42aa32b1dd", &(0x7f0000000100)=""/99}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r2, &(0x7f00000004c0)="eafb85f5c903e803e99f1a218e9ca7c93de7bd32f6d2aa222680c56c08f23972104ea39294af000146ba5e4829a8e58465ffd8af8a66e504243c76eded0fb1c589fccdd7122a6eaa48e27242f38f71c61a26a9c5bfbfc0dafb9e22a3936f988bc408238a3616ba54461fe8fbb8a581e5e164f5de3c86c46bd01a6020e8a01886e7b61f1642061369b7b75b62c57303826d153c06c43833e54e", &(0x7f0000000580)=""/84}, 0x18) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000480)={0x6, 0x586, &(0x7f0000000380)="002ae86d0b30302df4c72d740e358b0db58aa66cb761d76b0df8f7a45cc1cafa0b55c849fbd05d1d2fc560d638d375d026090188bbf185bade81147d1f976f21dbcf011161ab60493e4edd0b6db18b732ce9c1bfc38dbeb307cbbd01ed0d41243b2ca72d01b5b5aad710169ef45052345cc313b1511ae39b917a389141fbf04e0945a213f1c82e8a34caef6019baec2bfead2989e42f5f74e3cd0bb1c8f8ffd29a762408e46e20edfee43ec183de50d6eacad169a200877ac9971ada7311d24f2329bcd28c36c1e11469263a32", &(0x7f0000000240)="b55beb47b6bdba0341858538d46d97c10cc179661dbd402d8030e28e622e2408b0381db7bbe8f9791aa983af0f1591e37a75d7f622c9af", 0xcd, 0x37}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 974.768112] XFS (loop1): Invalid superblock magic number [ 974.826218] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x600}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc802}) 00:08:56 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'eql\x00', {0x2, 0x4e21, @broadcast}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="14df70fde101ffff00c82041ae00000000000000"], 0x14}}, 0x0) 00:08:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 975.136305] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 975.154457] XFS (loop1): unknown mount option []. 00:08:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x700}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 975.191977] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000401ffff00000002000000000000000084de590cc523c1f928ecd0b04c8e39ad9b8541a81e62061323c059c42b04d5507d290ed184adb8b3856c427a6c1471150a65e7cb64e2d2dbde65b3b7ade69d1ad3fadc24f2d3d8326827169d2357960406"], 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x24}}, 0x40000) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x100000000) socket$inet_tcp(0x2, 0x1, 0x0) 00:08:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x68000000}) [ 975.304623] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 975.316619] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:08:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000050000000000851e1c0000910085b628bdf92259563ba6f8f9f7a56640aaf8b95296276168010100004b5049708e866cee1c03c7afd274d73339698f5180fa24a9f9c0e9a0815f9699cfdc11b0e75c82763213dae2611e7c36963d89066634ee4780af67c5e4ece92cd093f807c8fdca8843e9781f6a469fc486fa285b803d185017769f128c0efc643dadc6af17573e5af81b21bdc3452d29d7c964456bb5402b4ada1466d0ee0f3d0d6a75121ebc20fb6df411013c78"], 0x14}}, 0x0) 00:08:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:57 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000001c0)={{0x3, 0x0, 0x2, 0x3, 0x9}, 0x1, 0x400000000000}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) fsetxattr(r1, &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f0000000140)='\x00', 0x1, 0x2) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff52}}, 0x20000000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000240)) 00:08:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 975.605090] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00', 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 975.665279] XFS (loop1): Invalid superblock magic number [ 975.716929] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:08:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:08:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsu', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x97ffffff}) 00:08:57 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x323, 0x10000, 0x7, 0xff, 0x100000000, @random="90f3df56fe99"}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff000000000000000000000000"], 0x14}}, 0x0) 00:08:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673fc", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 976.067612] XFS (loop1): unknown mount option [ÿ]. 00:08:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x14}}, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000080)) [ 976.155738] XFS (loop1): unknown mount option [ÿ]. 00:08:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x48}) 00:08:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:08:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs{', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) ptrace$peekuser(0x3, r1, 0x51) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000140)={0x0, 0xffffffffffffff08, 0x30}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000001c0)={r3, 0xffffffff}, &(0x7f0000000200)=0x8) 00:08:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667397", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 976.469964] XFS (loop1): unknown mount option [H]. 00:08:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000401ffff000000000000000000000000e3dcc7d2d56ca01b75f1292275882fde86ea104e52491df85db53d920fb5b65d7b4b0ca8ed0d5be550a6071c29a9858920c20f964776ca75ed829d2557b13fe5ef7a8a83662c3fe8d48055236f859ccab85319b5d7a8b3144ec44bbd9d588067ff3e08fbeccb90b93ef4d1ad77dfed718b7bb824703773c81ede6178a8549347d05873db32dd5001b32f2e290be6543c5ae6ca17cf548c0ad9c77b189ea73d9d31f5472e150622989d96f00931e0d281691f5d4f7137f13510cbce70d56ed876e1ea28afc80a788af73a9e96d2089500000000000000"], 0x14}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x100000000, 0x8000) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 00:08:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 976.525664] XFS (loop1): unknown mount option [H]. 00:08:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfffffdfc}) 00:08:58 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) 00:08:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsL', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 976.924100] XFS (loop1): unknown mount option [ü]. 00:08:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000f40301ffff579cbc32da2cb211ff62bfe8bc000000000000070875040000005dd375b8be000000"], 0x14}}, 0x0) r1 = accept4(r0, &(0x7f0000000100)=@ethernet={0x0, @local}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x4100, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000280)={0x0, 0x0, 0x2080}) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000001c0)={@remote}, &(0x7f0000000200)=0x14) 00:08:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 977.114458] XFS (loop1): unknown mount option [ü]. 00:08:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000140)=ANY=[@ANYBLOB="97000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c0000000000000000000000000000000000000000000000000000"]) 00:08:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8200000000000000}) 00:08:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9fd205b54c29"], 0x14}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x20) 00:08:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667303", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x5, &(0x7f0000001540)=[{&(0x7f00000003c0)="c1aa723333e6a33a60866d4e3356a3e6bb83f7d789bae1e035c43815dbb62933f7", 0x21, 0x40}, {&(0x7f0000000400)="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", 0x1000, 0xfffffffffffffc0b}, {&(0x7f0000001400)="b672233494ebf908921e01bd8d62ed", 0xf, 0x7}, {&(0x7f0000001440)="378fda4a7033d3bb7456e465f994c3ff8debe5d0e4f4da08b4e6516aacee898ddef040f30a8c6095", 0x28, 0x8}, {&(0x7f0000001480)="d1a91f67a5e4eb5ae86db5ed1bce2d6c6f7eed8e3829d0ce8566a3564efa4ee30f1effeaaefd5c2785b990d8897a008db7262c4005fd563a0440502df907aa87094f4899b18f4260876930d4e873ec04f47dd5b8918216910e0659fb7874af10673f059b3c392ce57dd092dee185f2c9ee0e2c95b004ef89c2d1b0385b2ca0e4c156b1b486724c7dd21f002543f7b3a999516711e96c6a02f41287ac04fc8072eb78e23e5a44780bb23797da93fed62d26", 0xb1, 0x10000}], 0x58408, &(0x7f0000001680)={[{@quiet='quiet'}, {@part={'part', 0x3d, 0x20}}, {@file_umask={'file_umask', 0x3d, 0xffff}}, {@quiet='quiet'}, {@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x7a}}]}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x14200, 0x0) accept4$nfc_llcp(r2, 0x0, &(0x7f0000000140), 0x800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0xc0, &(0x7f0000000200)=[@in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0x1, @empty, 0x100000000000}, @in6={0xa, 0x4e20, 0x8, @empty, 0xffff}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e21, 0x2, @mcast1, 0x8001}, @in6={0xa, 0x4e20, 0x6, @empty, 0x5}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @rand_addr=0x200}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000340)={r3, 0x8}, &(0x7f0000000380)=0x8) [ 977.582331] XFS (loop1): Invalid superblock magic number 00:08:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x20000000}) 00:08:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:08:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000040112ff00000e00000000000092ccd9"], 0x14}}, 0x0) 00:08:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsL', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:08:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:08:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 978.027306] XFS (loop1): Invalid superblock magic number 00:08:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10402, 0x8) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000140)={0x1, 0x8}, 0x2) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:08:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xf000000}) 00:08:59 executing program 5: r0 = socket$inet(0x2, 0x7, 0x1) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000080)={'team_slave_0\x00', {0x2, 0x4e20, @rand_addr=0x3}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000440)=@req={0x28, &(0x7f0000000400)={'bridge_slave_1\x00', @ifru_data=&(0x7f00000003c0)="7754c398644240e6327c8d1e9922fd9a80af19911b18866fc3888f947968137f"}}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/policy\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000380)={{&(0x7f00000002c0)=""/119, 0x77}, &(0x7f0000000340), 0x42}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r3, 0x9}, 0x8) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:08:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:08:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:08:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 978.547849] XFS (loop1): Invalid superblock magic number 00:09:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sched_yield() sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff0000000000e5200000000000"], 0x14}}, 0x0) 00:09:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7400}) 00:09:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x2}, 0xfffffffffffffcee, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140002000401ffff61a35c00fedbdf2500400000"], 0x14}}, 0x800) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="c89d772681fe0eadfd9abd5fbd076b8609e68c0912064fb05aa52b0dea3e6d42e53c67e77cf3c8c496ac614dcbef97eead4a673808aa93ba4f9a9e742095aa0f5342f6ec67428d6a3b68157f5bbb7f15ddb9948ba2e0c8705fc63912d613d543b77852dc5cf6f4ee62765466264ecb0985fb426ee6ec8ed282dc33e6fdefeb7647d18f4e7ad7e0500e987329fba1ae099beaec3bd124b277a5f99429b57318439cd1c8a1f1a505713302ff4078f9bd0dfbf9e0a9479385ad4f54c1d46ce0f8c38c526ca0045c3d5120e5d8b034bb17946e5e3916577793170fee0b86a5d2d704c171f0f0954aceeef2bdbf40db83", 0xee}, {&(0x7f0000001240)="fe9946f8b9f095a29087307d1e4f50b7ec7d1dc637abded643e4105a96ca48412e617314e2344b63e02347310609f85b6fddcf439ca6d20dc2316fe81e4488a4ff45cd1b3497330438bec0c7b7736212e2e3575cf649823b6b08ddff1a3cd0adcf3accfea43513a30e15845f0d31e449cabb81f6c085d8e33d54fafb7ce1747346d1d495d5a19b086c314221f1b72fd80fc624bb18631791f0e4083a49d05aabe3aa9d8c1138fc61d7", 0xa9}, {&(0x7f0000001300)="48865843e83883ef10770c3e008fa6102fad676b47b57399f0e8fbfceb4a278c348b638cdfc7df91a44e03fa79c244462390fa8aad11f5e583ba28a967eaf4811c0b8baca2a01dbd3815880a420c0e3d075a67345bfcafc11291fa2448d51d68dee256862f2635f7c61f0ab3f6a7a79ef4d126918d88853be04733aa152617d351ae19d8", 0x84}], 0x4, 0x2) 00:09:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667381", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 978.919231] XFS (loop1): Invalid superblock magic number 00:09:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff0058239da1cf12e019"], 0x14}}, 0x0) 00:09:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3c00}) 00:09:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsz', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000b880d7d377c17e00007265004eaecc1f76d0e02d60bf34319ad7cc1a0401ffff00"], 0x14}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x8000, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000200)={0x15, 0x13, &(0x7f00000001c0)="8897b85e78fd2e8de17932671882c65bd2ebe6"}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000140)=0xff, 0x4) [ 979.331197] XFS (loop1): Invalid superblock magic number 00:09:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 979.386145] __ntfs_error: 19 callbacks suppressed [ 979.386155] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 979.447763] Unknown ioctl -2146417262 [ 979.475716] Unknown ioctl -2146417262 00:09:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4000000000000000}) 00:09:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 979.499773] ntfs: (device loop4): parse_options(): Unrecognized mount option . 00:09:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x7, 0xffffffffffffffff, 0x0, 0x0, {0xd}}, 0x14}}, 0x2000000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10100, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) 00:09:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673e2", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 979.756985] XFS (loop1): Invalid superblock magic number [ 979.787423] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r2, 0x9, 0x800}, 0x8) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400ef82178c14c298e800000000000000000000"], 0x14}}, 0x0) 00:09:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4c00000000000000}) 00:09:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001201ffff001c00000000000000800000"], 0x14}}, 0x0) [ 979.969834] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs{', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) unlink(&(0x7f0000000080)='./file0\x00') sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x178, 0x1, 0x5, 0x20, 0x70bd2a, 0x25dfdbfe, {0xf, 0x0, 0x6}, [@typed={0x10, 0x31, @str='security\x00'}, @typed={0x8, 0x2e, @str='[\x00'}, @typed={0x4, 0x75}, @nested={0xc, 0x2e, [@typed={0x8, 0x28, @fd=r1}]}, @nested={0x13c, 0x1e, [@generic="7c029ae2b00cc90e725e67ab77a1620bc0daff5b18824370516fa1c52d4093025668f4c3579ae2e93726c9d38062282ae78a8a98a1197b27adf7b916198b81984004887f8503905066cd79fe6364959d746200d924bd8735d103b7c26cbeb2e8480bc6138988e8619c49e1ed44d1f05e5c0815c1d9e56562f961e80d779e85ed2b9d8c72a6aae84fb47a6a80e54a12d0a7a9969d8b30d75da674605ac4d87426d6104d587353e3e8e6da6c904b0dd35f588bdd", @generic="faab64", @typed={0x4, 0x73}, @typed={0x4, 0xb}, @typed={0x14, 0x93, @ipv6=@loopback}, @generic="1d00e6b5320f31cc9a", @generic="c49c48fe0d62bcaa352cef1f3990c6741a7411f3c5f4323934be5dac2a92261f453c705b21190411c98a6bbdf191c52969052902682381baaa20b4767cf0566b4932da60ed0cbadb27a900a3448ae9ad36691b02555841aece39"]}]}, 0x178}, 0x1, 0x0, 0x0, 0x8880}, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 980.213988] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 980.286920] XFS (loop1): Invalid superblock magic number 00:09:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400000, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000800)={0x11, 0x0, 0x0}, &(0x7f0000000840)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000880)={r2, 0x1, 0x6, @remote}, 0x10) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 980.350254] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7a000000}) 00:09:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x2, 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400100, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000280)={@local, 0x0}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xfffffffffffffe8e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000a80)={&(0x7f0000000900)={0x148, r2, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x12c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x401}}}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x10}, 0x20000050) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 980.625745] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 980.672735] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x2) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') r3 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x1, 0x10040) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x4000, 0x0) r5 = syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0xaf58, 0x4300) r6 = accept4(r0, &(0x7f0000000580)=@pppol2tpin6, &(0x7f0000000600)=0x80, 0x80000) r7 = open(&(0x7f0000000640)='./file0\x00', 0x100, 0x80) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vhci\x00', 0x200000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0x8c, r2, 0x304, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9a}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x55}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40001}, 0x1) sendmsg$nl_netfilter(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x218, 0x8, 0xf, 0x200, 0x70bd29, 0x25dfdbfd, {0xd, 0x0, 0x4}, [@nested={0x174, 0x96, [@generic="6cb34564980186dfadf1aa202eded049502440117b54ca876be240ba2c72aebf3415b1ae8ee33f74ad4dffbbdf143f879c4d5afac8c868095655e583165275fad811cfcb048ee9ba9e", @generic="a5aebd0326cc723fcf1edf8bde34729ed195ee8c5d561848bdda93d0264c0b5ad9539bb636fe538fa05c0005416573ac9b6e93d35cfce2884830067a62ebd94d36921909878f7ecfa8d7b0d6a05ce80476a4e9768145d5529173c277027b2ffad57e028c4611c179b2d414f09ec68ea1ae1438ad7edba4e460382a9d4109cfa6b65be9ad0357f24e30c2a4d4d00602a942415df5ce", @generic="7b607cf40b312ce5990d79655489c422667c2a171398561fba395918c21876ae65a0f31ee71fc5738790255eaf90fe10580804ef8aaddcf5ec57ecd4471ebc54f2d6936fa5f4b68fc1ceb3ceb8cec897e1dd215655d09f2a03a6bbb2ab4ab068ee55aed8481bc21026a5422639f64b2d6c244e33b9de7e73d1280ed825376011d64859f530e5348a", @typed={0x8, 0x5b, @fd=r0}]}, @generic="aa80ecdef54b3b95e3c4eb54a9c03255a6dc59d749800efc5fa877632a5566ca5ea1348fe314a3dee20313006fcc4ed813a9d027dfa1bd48d4bfb8996c3ed26bd55f2298fe8a7d716eab7e17d7b99df05b3250c0d0f598ff6bd572f59d9db3e4c80175a129", @generic="e4b1632427585c63b79ee3f0958e0c76278a63b8d15121", @typed={0x14, 0x52, @ipv6=@loopback}]}, 0x218}, 0x1, 0x0, 0x0, 0x1}, 0x4000800) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000000"], 0x14}}, 0x0) [ 980.750449] XFS (loop1): Invalid superblock magic number [ 980.768314] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x2000) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000140)=""/91) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xa}}, 0x14}}, 0x0) 00:09:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsl', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc7b}) 00:09:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 981.030953] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1020004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r2, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xdd0}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x8c4}, 0x4000) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000300)={0x9, 0x10, 0x1, r1}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000180)=0x4) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xfdf2, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="fe01000401e6ff000000000300000000000000"], 0x14}}, 0x0) 00:09:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 981.190775] XFS (loop1): unknown mount option [{]. 00:09:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffffff00000000}) 00:09:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff0000005d0a580b48141f101e"], 0x14}}, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 00:09:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000004f7feff000000000000000000000000"], 0x14}}, 0x0) 00:09:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 981.694641] XFS (loop1): Invalid superblock magic number 00:09:03 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x48, 0x414000) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000140)="8368fb2f23381ec034ba198db8577c15d017256b384261b9be87e45035da132e146203b87485f63baf7ea333888c3ea66dce04fe2c0fbee0ce32a97bceb8f23353f714cf09cd6919c52b6b4208e19a91cf594dd465ddfae6a2782078d3682b9dd122778a90875f267a92ff8576a987fc8750ea5c8bbff42f3a98e139b6245d7bf95e2510b8659760c6b30d14a4a82c3772044da8caf54752ba5fbb8299a4f0fb768900191e8e1110bb37") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x160) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000300)=""/163) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="11000100000500ebfe5069f306ca255af1b2125bc700fbffffff0000853f62460105fca208089db43429e8b36da5"], 0x14}}, 0x0) 00:09:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1000000}) 00:09:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = msgget(0x0, 0x100) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000080)=""/44) 00:09:03 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x80) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 982.157286] XFS (loop1): Invalid superblock magic number 00:09:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x10002) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x800) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000300)=""/30, 0x1e}, {&(0x7f0000000340)=""/242, 0xf2}, {&(0x7f0000000440)=""/15, 0xf}], 0x3, 0x0, 0x0, 0xb263}, 0x40010063) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f00000008c0)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000500)={@remote, 0x0}, &(0x7f0000000540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000580)={@ipv4={[], [], @dev}, 0x0}, &(0x7f00000005c0)=0x14) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000880)={&(0x7f0000000140), 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x214, r3, 0x202, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0xb8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0xec, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x214}, 0x1, 0x0, 0x0, 0x40}, 0x1) 00:09:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6800000000000000}) 00:09:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfst', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000401ffff000000000000000000000000f4796ce0d020aeaa0a16a395f1bfd02dbf4f004de2fae1e1922528e8383129d5d29b804adab7158cfb371be62a"], 0x41}}, 0x0) 00:09:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 982.626733] XFS (loop1): Invalid superblock magic number 00:09:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = dup3(r0, r0, 0x1000000000080000) r2 = geteuid() write$selinux_load(r1, &(0x7f0000000500)={0xf97cff8c, 0x8, 'SE Linux', "3101508983c63875bef8c7ea6163375973798286517ef04a03cce812b27ab0fcc8a08a8dbb0c010f7bb794d389a432e5e65e4ae268e7bbad6e7b7842c687083d20973206fb"}, 0x55) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r3, 0x618, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x8000) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffff7f}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x80) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x1000000, &(0x7f00000006c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c70e45f5c6fa7726f6f746d6f64653d3030303130303030303030303030303030313f303030302c757365725f69643d", @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',allow_other,blksize=0x0000000000000400,allow_other,default_permissions,max_read=0x0000000000000004,max_read=0x0000000000000002,default_permissions,\x00']) 00:09:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2000000}) 00:09:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000080)=""/35, 0x2}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000401ffff00000000000000000000000047849675c9315d4cb81032871aeceb9f5b1cfe4eebff5e612d275e499c25425a4d29be23d9385609b02cdca2b05f3e773d2575fc4f99cd"], 0x14}}, 0x0) 00:09:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x500, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:04 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x114) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xf5, 0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x200080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) 00:09:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\n', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xff, 0x2000) write$P9_RLERROR(r1, &(0x7f0000000140)={0xa, 0x7, 0x1, {0x1, '('}}, 0xa) [ 983.198045] XFS (loop1): Invalid superblock magic number 00:09:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3f00}) 00:09:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200000) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000140)) 00:09:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsk', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2200, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000001180)=ANY=[@ANYBLOB="14000000efeb1c1f4b35269711010400000000007d37f73d43a810d17db501f0085fda6f9aa58d1f15882428e7608ebea1d8cafa3164fa8ff4dcb5b3a4918e2946b74dda57d46d6022d97899dbaf58c50355140000e8ebcff4654b122e93122c7df5d9a859a9a091c62dfca21409e83b7d712a20b4b509fe99fb0145b3b3132a8e4e2072b9"], 0x14}}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x96, 0x80) socketpair(0x2, 0x5, 0x9, &(0x7f0000001140)) read$FUSE(r1, &(0x7f0000000140), 0x1000) 00:09:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 983.739972] XFS (loop1): Invalid superblock magic number 00:09:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2c00}) 00:09:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4c00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff000000000000000000ae89f2"], 0x14}}, 0x0) inotify_init() 00:09:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_dccp(0x2, 0x6, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="86478c55429129003b0000005175a700000000"], 0x14}}, 0x0) 00:09:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 984.249461] XFS (loop1): Invalid superblock magic number 00:09:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x40000001, 0xffffffffffffffff}, 0xfffffffffffffef7}}, 0x20000000) 00:09:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfffffff5}) 00:09:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 984.441951] __ntfs_error: 26 callbacks suppressed [ 984.441962] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 984.538685] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 984.574968] XFS (loop1): unknown mount option [õ]. 00:09:06 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) 00:09:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 984.637206] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 984.663780] XFS (loop1): unknown mount option [õ]. [ 984.673598] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1000000000000}) 00:09:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000401ffff0000000000000000000000004e66e881e06a74c0713ff983c1bd45c073223182788a6dabee9ae21b5a0542d2e8ef1abfdd8b74f6a3127ec7dac4c052286ec3d619a9150000a9f756225960803ba6c039f9f5eb46af6117770cc5074b6efb3e0b35c38cbb6c16cdcea5ef2b9475dbf3a88a27455b10aba9"], 0x14}}, 0x0) 00:09:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 984.895507] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) 00:09:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 984.968282] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 984.983277] XFS (loop1): Invalid superblock magic number 00:09:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x9, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2000000000000000}) 00:09:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 985.159742] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 985.274279] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 985.309196] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xfffffffffffffff5, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="010000000401ffff000000000004000000000000"], 0x14}}, 0x0) prctl$void(0x1f) [ 985.350919] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7b0c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 985.422887] XFS (loop1): Invalid superblock magic number 00:09:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673c0", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:07 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x802, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@int=0x959e, 0x4) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="dfba9cd7a5efb1fbd9394d320a3be897"], 0x14}}, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)={0x80000000, 0x100000001, 0x2, 0x0, 0x7, [{0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x2902}, {0x9, 0x8, 0x7, 0x0, 0x0, 0x400}, {0x9, 0x6, 0x1ff, 0x0, 0x0, 0x100}, {0x6, 0x8, 0x10d99ea0, 0x0, 0x0, 0x3582}, {0xfffffffeffffffff, 0xffffffffffffffe1, 0x25, 0x0, 0x0, 0x4}, {0xffff, 0x1, 0x7, 0x0, 0x0, 0x600}, {0xfffffffffffffff8, 0x165, 0x0, 0x0, 0x0, 0x2400}]}) 00:09:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xe0000}) 00:09:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x13000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0x26f, &(0x7f00000000c0)={&(0x7f0000000100)={0xe, 0x4, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 00:09:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000140)=0x7f, 0x4) [ 985.919265] XFS (loop1): Invalid superblock magic number 00:09:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xe2030000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xf5ffffff}) 00:09:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = syz_open_pts(0xffffffffffffff9c, 0x8000) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000080)={0x7, 0xa1}) 00:09:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 986.218481] XFS (loop1): unknown mount option [ÿ]. 00:09:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x60, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 986.313662] XFS (loop1): unknown mount option [ÿ]. 00:09:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000047f00ffff000000000000000000000000d409ea69cac12687c4925db57ad06976a2faf69f9bb24cdc14b7efc77834c4e97a353a29482c8d63204e064227283c929f63980f5f91a71925d5b4813f46b4"], 0x14}}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={"5a8a1f0000000000528f00", {0x2, 0x4e1f, @multicast1}}) accept4(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80, 0x80000) 00:09:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6c000000}) 00:09:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsz', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:08 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname$netlink(r0, &(0x7f00000001c0), &(0x7f0000000200)=0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 986.693664] XFS (loop1): Invalid superblock magic number 00:09:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000401ffff00000000800000000300000009d26a18e541b9a2307f80b764bd619f9cfc160829752aa8d47cff9fb0d7919950898d897716a854cd93615f34d80ab5df1d1e51e3b55ff97c2d3fb296de88bc0f90183c8c51e483adb6bf11b2f5e87384947f29cf26f4892e049245a6727e02e546748596aa"], 0x14}}, 0x0) 00:09:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffff7f}) 00:09:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000680)={0x2, 0x0, &(0x7f0000000140)=""/94, &(0x7f00000005c0)=""/175, &(0x7f00000007c0)=""/169, 0xf000}) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000700)={'filter\x00'}, &(0x7f0000000780)=0xfebc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="5409000400000002af54fbc52add1cffc99f394e6b517bb0f28108000000a18caaf28340000000000000001000000000000000e874f8ce2f8712ff89058aa2554a38c19ef6a0739aae"], 0x14}}, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @loopback, @loopback}, &(0x7f00000006c0)=0xc) sendto$packet(r1, &(0x7f0000000900)="cf45bfa5ceed027db4904b606e244c0161e5c4ef54df27051c1bfb1254fe8af02ea4c17220f0dc17742fd62ca23200ea97daaa44ceee8ba9926924558a47fdee4eae39e3567685b9ed5298d41825f8a1404516288e57e829e5c952d1", 0x5c, 0x4040, &(0x7f0000000980)={0x11, 0xf8, r3, 0x1, 0x8, 0x6, @random="8690d56f3060"}, 0x14) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000001c0)={"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"}) 00:09:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 987.002640] XFS (loop1): unknown mount option []. [ 987.076498] XFS (loop1): unknown mount option []. 00:09:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8003}) 00:09:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) timerfd_create(0x7, 0x80800) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x400, 0x5, 0x100000001, 0x5, 0x6, 0x2, 0x5, {0x0, @in6={{0xa, 0x4e23, 0x7, @ipv4={[], [], @loopback}, 0x80}}, 0x6, 0x6, 0x0, 0x3, 0x1}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x7}, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000100)=@routing={0x1d, 0x6, 0x2, 0x7, 0x0, [@loopback, @local, @local]}, 0x38) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000280)=0x80000001) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) 00:09:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 987.308353] XFS (loop1): unknown mount option []. 00:09:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 987.391769] XFS (loop1): unknown mount option []. 00:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x2c42, @empty, 0xffffffffffffd24e}}, 0x3ff}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r2, 0x0, 0x30, 0xec0, 0x63ad}, &(0x7f0000000280)=0x18) 00:09:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4800, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4}) 00:09:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:09 executing program 5: sysfs$3(0x3) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400000004000000000000004ebaef1c000000001edad93282acfa7f5f4cf6100acbe45d96df62cc5fb7a8ac84f2dfb436797afccb40d31dc73929f786d77c18303299a79028aa0820bd4723a50720ecf0add48cca2360a367c5b0ca9e089c12d38405bb7d99ae3b9fbd57e083464c4a73efa17496b4e8d2c95cb0a4b9982a28855479504cd2f116fab1bc79d77ac78247304c3807c086203cd5da515e8076baa6c49a053b988e372e52900fd9bb89cf196f1179cf0040"], 0x14}}, 0x0) 00:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 987.664225] XFS (loop1): unknown mount option []. [ 987.727626] XFS (loop1): unknown mount option []. 00:09:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x82}) 00:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="5483f0637f609f8701a08c96d7"], 0x14}}, 0x0) 00:09:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x281, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 988.009685] XFS (loop1): unknown mount option [‚]. 00:09:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x13, 0x80000, 0x400, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_DEV_DESTROY(r1, 0x5502) socket$inet6_sctp(0xa, 0x0, 0x84) tee(r0, r0, 0x4, 0xf) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401ffff000000000000000000008000"], 0x14}}, 0x0) 00:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsl', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xa000000000000000}) 00:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6b6b6b00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x3, @local, 0x9}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x4e20}], 0x3c) mlockall(0x1) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000401df2619c6902b3bcd0036866ac815"], 0x14}}, 0x0) 00:09:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 988.483882] XFS (loop1): Invalid superblock magic number 00:09:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7a00000000000000}) 00:09:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 988.819385] XFS (loop1): Invalid superblock magic number 00:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x80010000}) [ 989.240773] XFS (loop1): Invalid superblock magic number 00:09:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="7effffff0601ffff000000000000000000000000282c0537b6498125e09aca75"], 0x14}}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xff, 0x100) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x6, 0x4) 00:09:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x22000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffffffc0000001}) 00:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:11 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') sendfile(r0, r1, &(0x7f0000000000)=0x5c, 0x80000003) 00:09:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x700, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673fd", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 989.590364] XFS (loop1): unknown mount option []. [ 989.606389] __ntfs_error: 40 callbacks suppressed [ 989.606401] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 989.692635] XFS (loop1): unknown mount option []. 00:09:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0x9003}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 989.771971] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2}) 00:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0x9003}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 00:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 990.053072] XFS (loop1): unknown mount option []. [ 990.064122] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 990.147682] XFS (loop1): unknown mount option []. [ 990.177586] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 990.216064] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x300}) 00:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x4e22, @dev}, 0x80, &(0x7f0000001180), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000000000000000000000100000000000000"], 0x14}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000001cb, 0x0) 00:09:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3e2, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) futex(&(0x7f0000000100), 0x400000085, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x40000000) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 990.473062] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 990.498079] XFS (loop1): Invalid superblock magic number 00:09:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 990.588161] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 990.603022] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x97ffffff00000000}) [ 990.672797] input: syz1 as /devices/virtual/input/input10 00:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = accept(r0, &(0x7f0000000440)=@alg, &(0x7f00000004c0)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000005c0)=0x2, 0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)={'syz0', "9b64c7a0a066814b31d3e6b5e705029c15cde846b159e92b78b09e2e6aba2b54b8ce2aaa3a8b0b3ef27d73bd1607d69c6301588f680fd4c2f921035c2f5ba8669248d86ca5"}, 0x49) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$inet(0x2, 0x807, 0x9) 00:09:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 990.792965] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 990.975044] XFS (loop1): Invalid superblock magic number [ 991.001884] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25755 sclass=netlink_route_socket pig=11119 comm=syz-executor5 [ 991.025305] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc400000000000000}) [ 991.505011] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 991.537393] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:09:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8102000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfsh', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 991.667479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25755 sclass=netlink_route_socket pig=11146 comm=syz-executor5 [ 991.832568] XFS (loop1): Invalid superblock magic number 00:09:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 992.758111] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:09:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) execve(&(0x7f0000000400)='./bus\x00', &(0x7f0000000500), &(0x7f0000000880)) 00:09:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2200000000000000}) 00:09:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000640)=0xffff, 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000780)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000300)="afb6bbfa61c734c0e2ab4d5c8a947dd31a1b0ec1dedc19191036281b09f3b6658fb39682c7c313bd71003fc99541de2c1609ea19f2feb352f6ccd8a92b4692f51002563ff70e9558c8dd7ae4913212c4c10dd205070abff187dbb9b56c4e8e99f92bf7aa42aa32b1dd", &(0x7f0000000100)=""/99}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r2, &(0x7f00000004c0)="eafb85f5c903e803e99f1a218e9ca7c93de7bd32f6d2aa222680c56c08f23972104ea39294af000146ba5e4829a8e58465ffd8af8a66e504243c76eded0fb1c589fccdd7122a6eaa48e27242f38f71c61a26a9c5bfbfc0dafb9e22a3936f988bc408238a3616ba54461fe8fbb8a581e5e164f5de3c86c46bd01a6020e8a01886e7b61f1642061369b7b75b62c57303826d153c06c43833e54e", &(0x7f0000000580)=""/84}, 0x18) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000480)={0x6, 0x586, &(0x7f0000000380)="002ae86d0b30302df4c72d740e358b0db58aa66cb761d76b0df8f7a45cc1cafa0b55c849fbd05d1d2fc560d638d375d026090188bbf185bade81147d1f976f21dbcf011161ab60493e4edd0b6db18b732ce9c1bfc38dbeb307cbbd01ed0d41243b2ca72d01b5b5aad710169ef45052345cc313b1511ae39b917a389141fbf04e0945a213f1c82e8a34caef6019baec2bfead2989e42f5f74e3cd0bb1c8f8ffd29a762408e46e20edfee43ec183de50d6eacad169a200877ac9971ada7311d24f2329bcd28c36c1e11469263a32", &(0x7f0000000240)="b55beb47b6bdba0341858538d46d97c10cc179661dbd402d8030e28e622e2408b0381db7bbe8f9791aa983af0f1591e37a75d7f622c9af", 0xcd, 0x37}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffff1f0000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 995.683378] XFS (loop1): Invalid superblock magic number 00:09:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2c000000}) 00:09:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667305", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000640)=0xffff, 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000780)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000300)="afb6bbfa61c734c0e2ab4d5c8a947dd31a1b0ec1dedc19191036281b09f3b6658fb39682c7c313bd71003fc99541de2c1609ea19f2feb352f6ccd8a92b4692f51002563ff70e9558c8dd7ae4913212c4c10dd205070abff187dbb9b56c4e8e99f92bf7aa42aa32b1dd", &(0x7f0000000100)=""/99}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r2, &(0x7f00000004c0)="eafb85f5c903e803e99f1a218e9ca7c93de7bd32f6d2aa222680c56c08f23972104ea39294af000146ba5e4829a8e58465ffd8af8a66e504243c76eded0fb1c589fccdd7122a6eaa48e27242f38f71c61a26a9c5bfbfc0dafb9e22a3936f988bc408238a3616ba54461fe8fbb8a581e5e164f5de3c86c46bd01a6020e8a01886e7b61f1642061369b7b75b62c57303826d153c06c43833e54e", &(0x7f0000000580)=""/84}, 0x18) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000480)={0x6, 0x586, &(0x7f0000000380)="002ae86d0b30302df4c72d740e358b0db58aa66cb761d76b0df8f7a45cc1cafa0b55c849fbd05d1d2fc560d638d375d026090188bbf185bade81147d1f976f21dbcf011161ab60493e4edd0b6db18b732ce9c1bfc38dbeb307cbbd01ed0d41243b2ca72d01b5b5aad710169ef45052345cc313b1511ae39b917a389141fbf04e0945a213f1c82e8a34caef6019baec2bfead2989e42f5f74e3cd0bb1c8f8ffd29a762408e46e20edfee43ec183de50d6eacad169a200877ac9971ada7311d24f2329bcd28c36c1e11469263a32", &(0x7f0000000240)="b55beb47b6bdba0341858538d46d97c10cc179661dbd402d8030e28e622e2408b0381db7bbe8f9791aa983af0f1591e37a75d7f622c9af", 0xcd, 0x37}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x33000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 995.851302] __ntfs_error: 19 callbacks suppressed [ 995.851314] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000640)=0xffff, 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000780)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000300)="afb6bbfa61c734c0e2ab4d5c8a947dd31a1b0ec1dedc19191036281b09f3b6658fb39682c7c313bd71003fc99541de2c1609ea19f2feb352f6ccd8a92b4692f51002563ff70e9558c8dd7ae4913212c4c10dd205070abff187dbb9b56c4e8e99f92bf7aa42aa32b1dd", &(0x7f0000000100)=""/99}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r2, &(0x7f00000004c0)="eafb85f5c903e803e99f1a218e9ca7c93de7bd32f6d2aa222680c56c08f23972104ea39294af000146ba5e4829a8e58465ffd8af8a66e504243c76eded0fb1c589fccdd7122a6eaa48e27242f38f71c61a26a9c5bfbfc0dafb9e22a3936f988bc408238a3616ba54461fe8fbb8a581e5e164f5de3c86c46bd01a6020e8a01886e7b61f1642061369b7b75b62c57303826d153c06c43833e54e", &(0x7f0000000580)=""/84}, 0x18) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000480)={0x6, 0x586, &(0x7f0000000380)="002ae86d0b30302df4c72d740e358b0db58aa66cb761d76b0df8f7a45cc1cafa0b55c849fbd05d1d2fc560d638d375d026090188bbf185bade81147d1f976f21dbcf011161ab60493e4edd0b6db18b732ce9c1bfc38dbeb307cbbd01ed0d41243b2ca72d01b5b5aad710169ef45052345cc313b1511ae39b917a389141fbf04e0945a213f1c82e8a34caef6019baec2bfead2989e42f5f74e3cd0bb1c8f8ffd29a762408e46e20edfee43ec183de50d6eacad169a200877ac9971ada7311d24f2329bcd28c36c1e11469263a32", &(0x7f0000000240)="b55beb47b6bdba0341858538d46d97c10cc179661dbd402d8030e28e622e2408b0381db7bbe8f9791aa983af0f1591e37a75d7f622c9af", 0xcd, 0x37}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e74667303", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 996.043266] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 996.103656] XFS (loop1): Invalid superblock magic number 00:09:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x40000000}) 00:09:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000640)=0xffff, 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000780)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000300)="afb6bbfa61c734c0e2ab4d5c8a947dd31a1b0ec1dedc19191036281b09f3b6658fb39682c7c313bd71003fc99541de2c1609ea19f2feb352f6ccd8a92b4692f51002563ff70e9558c8dd7ae4913212c4c10dd205070abff187dbb9b56c4e8e99f92bf7aa42aa32b1dd", &(0x7f0000000100)=""/99}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r2, &(0x7f00000004c0)="eafb85f5c903e803e99f1a218e9ca7c93de7bd32f6d2aa222680c56c08f23972104ea39294af000146ba5e4829a8e58465ffd8af8a66e504243c76eded0fb1c589fccdd7122a6eaa48e27242f38f71c61a26a9c5bfbfc0dafb9e22a3936f988bc408238a3616ba54461fe8fbb8a581e5e164f5de3c86c46bd01a6020e8a01886e7b61f1642061369b7b75b62c57303826d153c06c43833e54e", &(0x7f0000000580)=""/84}, 0x18) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000480)={0x6, 0x586, &(0x7f0000000380)="002ae86d0b30302df4c72d740e358b0db58aa66cb761d76b0df8f7a45cc1cafa0b55c849fbd05d1d2fc560d638d375d026090188bbf185bade81147d1f976f21dbcf011161ab60493e4edd0b6db18b732ce9c1bfc38dbeb307cbbd01ed0d41243b2ca72d01b5b5aad710169ef45052345cc313b1511ae39b917a389141fbf04e0945a213f1c82e8a34caef6019baec2bfead2989e42f5f74e3cd0bb1c8f8ffd29a762408e46e20edfee43ec183de50d6eacad169a200877ac9971ada7311d24f2329bcd28c36c1e11469263a32", &(0x7f0000000240)="b55beb47b6bdba0341858538d46d97c10cc179661dbd402d8030e28e622e2408b0381db7bbe8f9791aa983af0f1591e37a75d7f622c9af", 0xcd, 0x37}) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:09:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 996.362732] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 00:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 996.514685] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 996.535901] XFS (loop1): Invalid superblock magic number 00:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 996.653161] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x10000000}) 00:09:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf00000000000000}}, 0x14}}, 0x0) 00:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 996.833836] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 996.907241] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 996.962163] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 997.100347] XFS (loop1): Invalid superblock magic number [ 997.114136] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) [ 997.196270] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2c8}) 00:09:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 997.462706] XFS (loop5): Invalid superblock magic number [ 997.497104] XFS (loop1): unknown mount option [È]. 00:09:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1f00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 997.572461] XFS (loop1): unknown mount option [È]. 00:09:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673ff", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4000000000000}) 00:09:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 997.826222] XFS (loop5): Invalid superblock magic number 00:09:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 997.964150] XFS (loop1): Invalid superblock magic number 00:09:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 'syz0\x00', &(0x7f0000000080)}) 00:09:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e7466737f", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1000000000000000}) 00:09:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 998.261822] XFS (loop5): Invalid superblock magic number 00:09:19 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e746673e2", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 'syz0\x00', &(0x7f0000000080)}) [ 998.449880] XFS (loop1): Invalid superblock magic number 00:09:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2200000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3000000}) 00:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 'syz0\x00', &(0x7f0000000080)}) 00:09:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 998.673437] XFS (loop5): Invalid superblock magic number 00:09:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)="6e7466738c", &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:20 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x60000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 998.974376] XFS (loop1): Invalid superblock magic number 00:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 999.091022] XFS (loop5): Invalid superblock magic number 00:09:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc400}) 00:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:20 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8102, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 'syz0\x00', &(0x7f0000000080)}) 00:09:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x9000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 999.449177] XFS (loop5): Invalid superblock magic number 00:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:21 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) [ 999.542807] XFS (loop1): Invalid superblock magic number 00:09:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 'syz0\x00', &(0x7f0000000080)}) 00:09:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x13, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x10}) 00:09:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x700, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 'syz0\x00', &(0x7f0000000080)}) [ 999.843631] XFS (loop5): Invalid superblock magic number [ 999.872803] XFS (loop1): unknown mount option []. 00:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 999.968266] XFS (loop1): unknown mount option []. 00:09:21 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x400000000000000}) 00:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1000.264303] XFS (loop5): Invalid superblock magic number 00:09:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xc7b, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:21 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1000.473776] XFS (loop1): Invalid superblock magic number 00:09:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xedc000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 'syz0\x00', &(0x7f0000000080)}) 00:09:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6b6b6b00000000}) 00:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1000.619342] XFS (loop5): Invalid superblock magic number 00:09:22 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 'syz0\x00', &(0x7f0000000080)}) 00:09:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1000.976971] XFS (loop1): Invalid superblock magic number 00:09:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 'syz0\x00', &(0x7f0000000080)}) 00:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 1001.060418] XFS (loop5): Invalid superblock magic number [ 1001.068221] __ntfs_error: 35 callbacks suppressed [ 1001.068233] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x22000000}) 00:09:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 'syz0\x00', &(0x7f0000000080)}) [ 1001.182425] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:22 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x33, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 'syz0\x00', &(0x7f0000000080)}) [ 1001.488146] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1001.531703] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 'syz0\x00', &(0x7f0000000080)}) [ 1001.578479] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1001.590115] XFS (loop1): Invalid superblock magic number [ 1001.632157] XFS (loop5): Invalid superblock magic number 00:09:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8200}) 00:09:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 'syz0\x00', &(0x7f0000000080)}) 00:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 1001.923628] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1001.938621] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1300000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1002.086848] XFS (loop1): Invalid superblock magic number [ 1002.118535] XFS (loop5): Invalid superblock magic number 00:09:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:23 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3c}) 00:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1002.303967] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1002.375975] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1002.387454] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 1002.473124] XFS (loop1): unknown mount option [<]. [ 1002.529441] XFS (loop5): Invalid superblock magic number 00:09:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x75000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x74000000}) 00:09:24 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 'syz0\x00', &(0x7f0000000080)}) 00:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 1002.920434] XFS (loop1): Invalid superblock magic number 00:09:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 'syz0\x00', &(0x7f0000000080)}) 00:09:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3f00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1003.030555] XFS (loop5): Invalid superblock magic number 00:09:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1f00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x82000000}) 00:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:24 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 'syz0\x00', &(0x7f0000000080)}) 00:09:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000600", &(0x7f0000000080)}) 00:09:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x68, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1003.427234] XFS (loop1): Invalid superblock magic number [ 1003.460553] XFS (loop5): Invalid superblock magic number 00:09:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x33, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8cffffff}) 00:09:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1003.752631] XFS (loop1): unknown mount option [ÿ]. 00:09:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300300", &(0x7f0000000080)}) 00:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1003.844304] XFS (loop1): unknown mount option [ÿ]. 00:09:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x800000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1003.876390] XFS (loop5): Invalid superblock magic number 00:09:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfcfdffff}) 00:09:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x81020000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000100", &(0x7f0000000080)}) 00:09:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1004.151659] XFS (loop1): unknown mount option [ÿ]. [ 1004.217461] XFS (loop1): unknown mount option [ÿ]. 00:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1004.289247] XFS (loop5): Invalid superblock magic number 00:09:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000200", &(0x7f0000000080)}) 00:09:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xd00}) 00:09:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6b6b6b, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x500, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000400", &(0x7f0000000080)}) 00:09:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1004.587217] XFS (loop1): Invalid superblock magic number 00:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000500", &(0x7f0000000080)}) 00:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 1004.702272] XFS (loop5): Invalid superblock magic number 00:09:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2c}) 00:09:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x74, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000300", &(0x7f0000000080)}) 00:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4c000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1005.103845] XFS (loop1): Invalid superblock magic number 00:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000600", &(0x7f0000000080)}) [ 1005.162392] XFS (loop5): Invalid superblock magic number 00:09:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x80030000}) 00:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1300, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\a\x00', &(0x7f0000000080)}) 00:09:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\a\x00', &(0x7f0000000080)}) 00:09:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1005.584556] XFS (loop5): Invalid superblock magic number [ 1005.590677] XFS (loop1): Invalid superblock magic number 00:09:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3300, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfdffffff}) 00:09:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300600", &(0x7f0000000080)}) 00:09:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6b6b6b00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000600", &(0x7f0000000080)}) [ 1005.933593] XFS (loop1): unknown mount option [ÿ]. 00:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1005.966957] XFS (loop5): Invalid superblock magic number [ 1005.993413] XFS (loop1): unknown mount option [ÿ]. 00:09:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6800}) 00:09:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000200", &(0x7f0000000080)}) [ 1006.089737] __ntfs_error: 46 callbacks suppressed [ 1006.089752] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1006.117772] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x74, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) [ 1006.359809] XFS (loop5): Invalid superblock magic number [ 1006.376787] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1006.390466] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000300", &(0x7f0000000080)}) 00:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1006.507347] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000100", &(0x7f0000000080)}) [ 1006.553545] XFS (loop1): Invalid superblock magic number [ 1006.569823] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x68000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffffd, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2000}) 00:09:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300200", &(0x7f0000000080)}) [ 1006.741358] XFS (loop5): Invalid superblock magic number 00:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000400", &(0x7f0000000080)}) [ 1006.922076] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1006.943031] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1007.032476] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4800, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1007.099027] XFS (loop1): Invalid superblock magic number [ 1007.119841] XFS (loop5): Invalid superblock magic number 00:09:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000500", &(0x7f0000000080)}) 00:09:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x42534658}) 00:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1007.350236] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000500", &(0x7f0000000080)}) [ 1007.423294] XFS (loop1): unknown mount option [X]. [ 1007.469254] XFS (loop1): unknown mount option [X]. 00:09:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4c00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x5, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1007.559273] XFS (loop5): Invalid superblock magic number 00:09:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3fffffff}) 00:09:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300400", &(0x7f0000000080)}) 00:09:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1007.788639] XFS (loop1): unknown mount option [ÿ]. 00:09:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300500", &(0x7f0000000080)}) [ 1007.862974] XFS (loop1): unknown mount option [ÿ]. 00:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 1007.911262] XFS (loop5): Invalid superblock magic number 00:09:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6c}) 00:09:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000300", &(0x7f0000000080)}) 00:09:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x900000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xedc0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1008.181828] XFS (loop1): unknown mount option [l]. 00:09:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000400", &(0x7f0000000080)}) 00:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 1008.271619] XFS (loop1): unknown mount option [l]. [ 1008.313462] XFS (loop5): Invalid superblock magic number 00:09:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8000000000000000}) 00:09:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x97ffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000100", &(0x7f0000000080)}) 00:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\a\x00', &(0x7f0000000080)}) [ 1008.667021] XFS (loop5): Invalid superblock magic number [ 1008.677958] XFS (loop1): Invalid superblock magic number 00:09:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x10, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000500", &(0x7f0000000080)}) 00:09:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xe000000000000}) 00:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x22000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x75, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1009.058642] XFS (loop5): Invalid superblock magic number 00:09:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000300", &(0x7f0000000080)}) 00:09:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) [ 1009.151322] XFS (loop1): Invalid superblock magic number 00:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000200", &(0x7f0000000080)}) 00:09:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc0000001}) 00:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8102, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000300", &(0x7f0000000080)}) 00:09:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1009.541587] XFS (loop1): unknown mount option []. [ 1009.556486] XFS (loop5): Invalid superblock magic number 00:09:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x900, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1009.641120] XFS (loop1): unknown mount option []. 00:09:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)) 00:09:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000500", &(0x7f0000000080)}) 00:09:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x9000000}) 00:09:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1f000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1009.823283] XFS (loop5): Invalid superblock magic number 00:09:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)) 00:09:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000600", &(0x7f0000000080)}) 00:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1010.074229] XFS (loop1): Invalid superblock magic number 00:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000300", &(0x7f0000000080)}) [ 1010.170640] XFS (loop5): Invalid superblock magic number 00:09:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3c000000}) 00:09:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)) 00:09:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3e2, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x900, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000400", &(0x7f0000000080)}) 00:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 1010.568574] XFS (loop1): Invalid superblock magic number 00:09:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1010.622352] XFS (loop5): Invalid superblock magic number 00:09:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff97, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000200", &(0x7f0000000080)}) 00:09:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x16000000}) 00:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000300", &(0x7f0000000080)}) 00:09:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff97, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1011.054654] XFS (loop1): Invalid superblock magic number 00:09:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x5000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:32 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce=',qnoenforce'}]}) 00:09:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000400", &(0x7f0000000080)}) [ 1011.147921] __ntfs_error: 44 callbacks suppressed [ 1011.147932] ntfs: (device loop4): parse_options(): Unrecognized mount option . 00:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xe}) 00:09:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xa000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1011.253549] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000500", &(0x7f0000000080)}) [ 1011.397143] XFS (loop5): Invalid superblock magic number [ 1011.428438] XFS (loop1): unknown mount option []. [ 1011.434930] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1011.478008] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0xf000000}}, 0x14}}, 0x0) [ 1011.525858] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1011.537319] XFS (loop1): unknown mount option []. 00:09:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xff0f}) 00:09:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xe203, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1011.784744] XFS (loop1): unknown mount option []. 00:09:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000100", &(0x7f0000000080)}) [ 1011.806359] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1011.838652] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1011.878341] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1011.890153] XFS (loop1): unknown mount option []. 00:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6b6b6b00}) 00:09:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x74000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x60000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000600", &(0x7f0000000080)}) [ 1012.054780] XFS (loop5): Invalid superblock magic number 00:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1012.163568] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1012.174671] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000600", &(0x7f0000000080)}) [ 1012.273857] XFS (loop1): Invalid superblock magic number 00:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x5000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfffffdfd}) 00:09:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1012.461739] XFS (loop5): Invalid superblock magic number 00:09:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\a\x00', &(0x7f0000000080)}) 00:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 1012.558451] XFS (loop1): unknown mount option [ý]. 00:09:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1012.657854] XFS (loop1): unknown mount option [ý]. 00:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000600", &(0x7f0000000080)}) 00:09:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3000000000000}) 00:09:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1012.857866] XFS (loop5): Invalid superblock magic number 00:09:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000200", &(0x7f0000000080)}) 00:09:34 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1013.056470] XFS (loop1): Invalid superblock magic number 00:09:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000500", &(0x7f0000000080)}) 00:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1600000000000000}) 00:09:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1013.340351] XFS (loop5): Invalid superblock magic number 00:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x60, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000200", &(0x7f0000000080)}) 00:09:35 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1013.497648] XFS (loop1): Invalid superblock magic number 00:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000300", &(0x7f0000000080)}) 00:09:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7500000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1013.670957] XFS (loop5): Invalid superblock magic number 00:09:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x900000000000000}) 00:09:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000500", &(0x7f0000000080)}) 00:09:35 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x5, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000400", &(0x7f0000000080)}) 00:09:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xe203000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1014.084684] XFS (loop5): Invalid superblock magic number [ 1014.094593] XFS (loop1): Invalid superblock magic number 00:09:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1f000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:35 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000600", &(0x7f0000000080)}) 00:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8001000000000000}) 00:09:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x9000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3f00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\a\x00', &(0x7f0000000080)}) [ 1014.499380] XFS (loop5): Invalid superblock magic number 00:09:36 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 1014.724060] XFS (loop1): Invalid superblock magic number 00:09:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xa00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xedc0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x500}) 00:09:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000500", &(0x7f0000000080)}) 00:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1014.909323] XFS (loop5): Invalid superblock magic number 00:09:36 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000100", &(0x7f0000000080)}) 00:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xe203000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1015.176062] XFS (loop1): Invalid superblock magic number [ 1015.220927] XFS (loop5): Invalid superblock magic number 00:09:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000100", &(0x7f0000000080)}) 00:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:36 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x7000000}) 00:09:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x74000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000200", &(0x7f0000000080)}) 00:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000300", &(0x7f0000000080)}) [ 1015.654237] XFS (loop5): Invalid superblock magic number 00:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1015.715664] XFS (loop1): Invalid superblock magic number 00:09:37 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x97ffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x81020000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000400", &(0x7f0000000080)}) 00:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc0ed0000}) 00:09:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x300, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1016.128448] XFS (loop5): Invalid superblock magic number [ 1016.151997] XFS (loop1): Invalid superblock magic number [ 1016.180987] __ntfs_error: 41 callbacks suppressed [ 1016.180998] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:37 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000300", &(0x7f0000000080)}) 00:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1016.299195] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xffffffffffffffff}) [ 1016.385194] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1016.421401] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000400", &(0x7f0000000080)}) 00:09:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7400, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 1016.498165] XFS (loop5): Invalid superblock magic number 00:09:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x22, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000500", &(0x7f0000000080)}) [ 1016.594504] XFS (loop1): unknown mount option [ÿ]. 00:09:38 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1016.727269] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1016.740803] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000500", &(0x7f0000000080)}) 00:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfffffffd}) [ 1016.870454] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1016.871124] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000200", &(0x7f0000000080)}) 00:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 1016.933815] XFS (loop5): Invalid superblock magic number [ 1016.959631] XFS (loop1): unknown mount option [ý]. 00:09:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:38 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3f00000000000000}) 00:09:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000300", &(0x7f0000000080)}) 00:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1017.257740] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000600", &(0x7f0000000080)}) [ 1017.305498] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1017.342086] XFS (loop5): Invalid superblock magic number 00:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1017.358790] XFS (loop1): Invalid superblock magic number 00:09:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:39 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000600", &(0x7f0000000080)}) 00:09:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x8cffffff00000000}) 00:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000600", &(0x7f0000000080)}) 00:09:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1017.720150] XFS (loop5): Invalid superblock magic number 00:09:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x48000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1017.824423] XFS (loop1): Invalid superblock magic number 00:09:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xe203, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfcfdffff00000000}) 00:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x40000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x13, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1018.181835] XFS (loop5): Invalid superblock magic number 00:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000600", &(0x7f0000000080)}) 00:09:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1018.321557] XFS (loop1): Invalid superblock magic number 00:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7500, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6000000}) 00:09:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffff6, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1018.649148] XFS (loop5): Invalid superblock magic number 00:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000500", &(0x7f0000000080)}) [ 1018.703360] XFS (loop1): Invalid superblock magic number 00:09:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x900000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x10000c0}) 00:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000600", &(0x7f0000000080)}) 00:09:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffff1f00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000200", &(0x7f0000000080)}) 00:09:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xe2030000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1019.054195] XFS (loop5): Invalid superblock magic number [ 1019.062302] XFS (loop1): unknown mount option [À]. 00:09:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1019.196917] XFS (loop1): unknown mount option [À]. 00:09:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000100", &(0x7f0000000080)}) 00:09:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x900}) 00:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000500", &(0x7f0000000080)}) 00:09:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x40000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x48000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000600", &(0x7f0000000080)}) 00:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 1019.508302] XFS (loop5): Invalid superblock magic number 00:09:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x20000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1019.623633] XFS (loop1): Invalid superblock magic number 00:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000300", &(0x7f0000000080)}) 00:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1019.744671] XFS (loop1): Invalid superblock magic number 00:09:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x68, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xfffffff6}) 00:09:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7b0c0000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000500", &(0x7f0000000080)}) 00:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1019.928959] XFS (loop5): Invalid superblock magic number [ 1019.978207] XFS (loop1): unknown mount option [ö]. 00:09:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffffd, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000300", &(0x7f0000000080)}) 00:09:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xff0f000000000000}) 00:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x600, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1020.302964] XFS (loop5): Invalid superblock magic number 00:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000600", &(0x7f0000000080)}) 00:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1020.474105] XFS (loop1): Invalid superblock magic number 00:09:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000500", &(0x7f0000000080)}) 00:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2c00000000000000}) [ 1020.683560] XFS (loop5): Invalid superblock magic number 00:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6b6b6b00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) [ 1020.874134] XFS (loop1): Invalid superblock magic number 00:09:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000100", &(0x7f0000000080)}) 00:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x40000}) [ 1021.008142] XFS (loop5): Invalid superblock magic number 00:09:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4c000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000300", &(0x7f0000000080)}) 00:09:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1021.237947] XFS (loop1): Invalid superblock magic number [ 1021.305360] __ntfs_error: 42 callbacks suppressed [ 1021.305379] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1021.338603] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000400", &(0x7f0000000080)}) 00:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4000}) [ 1021.402299] XFS (loop5): Invalid superblock magic number 00:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7b0c0000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1021.486034] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x75000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000200", &(0x7f0000000080)}) [ 1021.683633] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x40000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1021.792592] XFS (loop1): Invalid superblock magic number 00:09:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000400", &(0x7f0000000080)}) 00:09:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3300, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1600}) 00:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 1021.901106] XFS (loop5): Invalid superblock magic number [ 1021.938629] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000300", &(0x7f0000000080)}) [ 1022.054763] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1022.068101] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000400", &(0x7f0000000080)}) [ 1022.190552] XFS (loop1): Invalid superblock magic number [ 1022.224032] XFS (loop5): Invalid superblock magic number 00:09:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4800}) 00:09:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1300, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1022.377707] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000200", &(0x7f0000000080)}) 00:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1022.482091] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1022.514577] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1022.548131] XFS (loop1): Invalid superblock magic number [ 1022.558309] XFS (loop5): Invalid superblock magic number 00:09:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x48, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x281, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x380}) 00:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000600", &(0x7f0000000080)}) [ 1022.972837] XFS (loop1): unknown mount option [€]. [ 1022.989972] XFS (loop5): Invalid superblock magic number 00:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x700000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6000000000000000}) 00:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000300", &(0x7f0000000080)}) 00:09:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x300, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1023.353121] XFS (loop5): Invalid superblock magic number 00:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 1023.402685] XFS (loop1): Invalid superblock magic number 00:09:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3300000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x2300000000000000}) 00:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000600", &(0x7f0000000080)}) 00:09:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1023.796487] XFS (loop1): Invalid superblock magic number [ 1023.802313] XFS (loop5): Invalid superblock magic number 00:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7b0c000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x10000c0ffffffff}) 00:09:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1024.131839] XFS (loop5): Invalid superblock magic number [ 1024.154286] XFS (loop1): unknown mount option [ÿ]. [ 1024.204147] XFS (loop1): unknown mount option [ÿ]. 00:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000400", &(0x7f0000000080)}) 00:09:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xedc000000000}) 00:09:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000400", &(0x7f0000000080)}) 00:09:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x20000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1024.518195] XFS (loop5): Invalid superblock magic number [ 1024.547810] XFS (loop1): Invalid superblock magic number 00:09:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000600", &(0x7f0000000080)}) 00:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x3c00000000000000}) 00:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000400", &(0x7f0000000080)}) 00:09:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1024.970805] XFS (loop5): Invalid superblock magic number 00:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000500", &(0x7f0000000080)}) 00:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1025.044227] XFS (loop1): Invalid superblock magic number 00:09:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x16, &(0x7f0000000540)) 00:09:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc8020000}) 00:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000300", &(0x7f0000000080)}) 00:09:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x700000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000500", &(0x7f0000000080)}) [ 1025.408317] XFS (loop5): Invalid superblock magic number 00:09:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1025.506251] XFS (loop1): Invalid superblock magic number 00:09:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000600", &(0x7f0000000080)}) 00:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7b0c000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7500000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1f00}) 00:09:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000200", &(0x7f0000000080)}) 00:09:47 executing program 5: r0 = socket$inet6(0xa, 0x200000000000001, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @loopback}}}, 0x108) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e22, @loopback}}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet_buf(r0, 0x0, 0x100000040, &(0x7f0000000040), 0x0) 00:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000100", &(0x7f0000000080)}) [ 1025.916146] XFS (loop1): Invalid superblock magic number 00:09:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xedc000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000200", &(0x7f0000000080)}) 00:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x280}) 00:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1026.274169] XFS (loop1): unknown mount option [€]. 00:09:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000500", &(0x7f0000000080)}) [ 1026.481160] __ntfs_error: 43 callbacks suppressed [ 1026.481172] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 00:09:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7b0c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x1f00000000000000}) 00:09:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x22, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000300", &(0x7f0000000080)}) 00:09:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000500", &(0x7f0000000080)}) [ 1027.535002] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1027.549412] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) [ 1027.620734] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1fffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1027.694840] XFS (loop1): Invalid superblock magic number [ 1027.870521] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xf6ffffff}) 00:09:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x68000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:49 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000100)) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='ppp1lo{(cgroup\x00') 00:09:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000300", &(0x7f0000000080)}) 00:09:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1028.170456] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1028.227119] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1028.260998] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x10000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:49 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='system\x00', 0x0) fcntl$addseals(r0, 0x409, 0x0) [ 1028.319553] XFS (loop1): unknown mount option [ÿ]. 00:09:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000100", &(0x7f0000000080)}) [ 1028.443657] XFS (loop1): unknown mount option [ÿ]. [ 1028.471231] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1028.507768] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xc4000000}) 00:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000200", &(0x7f0000000080)}) 00:09:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffff6, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) r2 = dup2(r0, r0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000240)=ANY=[@ANYRESHEX], 0x12) 00:09:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1300000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000300", &(0x7f0000000080)}) [ 1028.814393] XFS (loop1): Invalid superblock magic number 00:09:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 00:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000600", &(0x7f0000000080)}) 00:09:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1fffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x600}) 00:09:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000300", &(0x7f0000000080)}) 00:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xc7b, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000300", &(0x7f0000000080)}) [ 1029.280348] XFS (loop1): Invalid superblock magic number 00:09:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 00:09:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000200", &(0x7f0000000080)}) 00:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0xa000}) 00:09:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6800, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000400", &(0x7f0000000080)}) 00:09:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 00:09:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 00:09:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1029.828228] XFS (loop1): Invalid superblock magic number 00:09:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x10, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb15", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x180}) 00:09:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000500", &(0x7f0000000080)}) 00:09:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1030.185230] XFS (loop1): unknown mount option [€]. 00:09:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000600", &(0x7f0000000080)}) 00:09:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getpid() semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x6}) 00:09:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1030.442823] XFS (loop1): unknown mount option []. [ 1030.505514] XFS (loop1): unknown mount option []. 00:09:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000500", &(0x7f0000000080)}) 00:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}], 0x4000000}) 00:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2200, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb15", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000400", &(0x7f0000000080)}) 00:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb15", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1030.839589] XFS (loop1): Invalid superblock magic number 00:09:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:52 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x101000, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10, 0x80000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r1, r2}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000200", &(0x7f0000000080)}) 00:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x75, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000300", &(0x7f0000000080)}) 00:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000400", &(0x7f0000000080)}) 00:09:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x40000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1031.296905] XFS (loop1): Invalid superblock magic number 00:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x10000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x9}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e20, 0x80000001, @loopback, 0x3b4}}}, 0x84) 00:09:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1031.536429] __ntfs_error: 35 callbacks suppressed [ 1031.536443] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000100", &(0x7f0000000080)}) 00:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1031.663838] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1031.743531] XFS (loop1): Invalid superblock magic number [ 1031.747359] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000500", &(0x7f0000000080)}) 00:09:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7500, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000600", &(0x7f0000000080)}) 00:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) rt_sigqueueinfo(r1, 0x24, &(0x7f0000000100)={0x1b, 0x3, 0x7fffffff, 0x4}) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x5, &(0x7f0000000480)=[{&(0x7f00000001c0)="40ae986a696854e653975521865d976c5802dce34e0764fb2df8149d0d004aab194619cde6b9b529c9acc76e9b0c21a4529af21de498ff6d548307c73aa5f8b997830111b83e24f3770825fcfe1b2cc55a9cf91b3393c8f6566a46c76ea55ab8bfa449b9fb7e6fd31ab3d8c3f68e7f1b536824b6a53568e4d51a981938c2ad050417576357ed6ca3205dd510a51a69c4bb393e2789a5e31ed9d9641a68d99b3be0d67f36198fd51605a34013cae2fd938a672e4aa0a8e585a6b48d345558b47a", 0xc0, 0xffffffff7fffffff}, {&(0x7f00000002c0)="b2e61aaa73c4c9581b4f8a4aac", 0xd, 0x6}, {&(0x7f0000000300)="c503e556a1f81e7d1ae2beec323ede7c834dc362a2c4c152bf2671757e8d334db9378a338a94", 0x26, 0x10001}, {&(0x7f0000000340)="b1be13c50c6d772cfc06144a753fba199d408f040936c1", 0x17, 0x30}, {&(0x7f0000000380)="55438e669b419cd8fe6b62a1d44c5eb5cb34d1565688d6442f45e434f14fdd507936ab1c00c655c72e33a657e880cdc69756d2c398212486e298700d6895c3be98b92c4fbf106f80eedc5a3969353092066cc8089accd33ce823ab0f308ce8513d434a714d65865064d4c13057954f88c8320bfb713148936a6de73a328b3085573c3c7b562c3d7ccdd80c36f425e2a8c91816e3bf0ff5c02c90299c15f693d6eba6c742ce82c3a014317e9af0effee96d74456d92def7e382c10f30e08c9e637333c564bfbfd3544edfe161b211e0d856372b2759344fa218e7", 0xda, 0x20}], 0x20080, &(0x7f0000000500)='%u\x00') syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="72443979fddb94f75763000000000562b900100000000000004234"]) 00:09:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1032.019041] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb15", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1032.086839] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1032.100438] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6800, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1032.204656] XFS (loop1): unknown mount option [rD9yýÛ”÷Wc]. 00:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1032.304117] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000100", &(0x7f0000000080)}) 00:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x25, 0x3, 0x0, {0x6, 0x4, 0x0, 'xfs\x00'}}, 0x25) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:54 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1032.413534] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000200", &(0x7f0000000080)}) [ 1032.579428] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:54 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1032.660751] XFS (loop1): Invalid superblock magic number [ 1032.668947] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x4c000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000600", &(0x7f0000000080)}) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") listen(r0, 0xd327) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:54 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000500", &(0x7f0000000080)}) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1033.159938] XFS (loop1): Invalid superblock magic number 00:09:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x2c00, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0xc000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000001c0)={'nat\x00', 0x0, 0x3, 0xc6, [], 0x1, &(0x7f0000000180)=[{}], &(0x7f00000002c0)=""/198}, &(0x7f0000000240)=0x78) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x100) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)={0x3, r3}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000300", &(0x7f0000000080)}) 00:09:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000600", &(0x7f0000000080)}) [ 1033.586187] XFS (loop1): Invalid superblock magic number 00:09:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x10, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:55 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x800, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="15bf6234488dd25d7662f0") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3300000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000500", &(0x7f0000000080)}) 00:09:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1034.044764] XFS (loop1): Invalid superblock magic number 00:09:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000200", &(0x7f0000000080)}) 00:09:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:09:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x4c, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x100000) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pkey_free(0xffffffffffffffff) r1 = request_key(&(0x7f0000000180)='keyring\x00', &(0x7f0000000040), 0x0, 0x0) keyctl$negate(0xd, r1, 0xfffffffffffffffc, r1) pkey_alloc(0x0, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r3, &(0x7f0000000480), 0x10000000000001ed, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="67716e000000000000001f2c00"]) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x80) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000400)={{{@in=@dev, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) setgroups(0x2, &(0x7f00000003c0)=[r5, r6]) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x0) removexattr(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)=@random={'btrfs.', '\x00'}) 00:09:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x33000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000600", &(0x7f0000000080)}) 00:09:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1034.432953] XFS (loop1): unknown mount option [gqn]. 00:09:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000400", &(0x7f0000000080)}) 00:09:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="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", 0x310, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) [ 1034.798239] XFS (loop1): unknown mount option [gqn]. 00:09:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000200", &(0x7f0000000080)}) 00:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000080002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000300", &(0x7f0000000080)}) 00:09:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000600", &(0x7f0000000080)}) [ 1035.145185] XFS (loop1): Invalid superblock magic number 00:09:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file1\x00', 0x7, 0x7, &(0x7f0000000480)=[{&(0x7f0000000100)="c4f412dc95c8264cf71caf344a221a2bc1885225ca19124774cc6e2ce744b8928e0c5fbaf0338f169847d95df53f4a22def0ed064bdbb29d4ed42196d01d80", 0x3f, 0x100000001}, {&(0x7f0000000580)="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", 0x1000, 0x9}, {&(0x7f0000000140)="9b52b45318fd760421c054d319096aaf5f8aaa56cfe8284a221fc4384eaf4f17351636b471965a0b031707", 0x2b, 0x8}, {&(0x7f0000000180)="3e7fe47e0dab04558adccd2ed0033dd21f68339e82f039b7ed9fff59b7b1b26cc885282d17dcb2220b474a0d2e335c6a8a12ea68b89168fa0e63b819b3ba860def92ae27b5e5d47142a9d0973c255bae2dc7a1fc2c19a37978833f973e6eaa979ab00f764ec0afdc368b02b9e2c353c59d2fafcdecacab4327598cd4951eed7a6c7d12951a75f13aea", 0x89, 0x7}, {&(0x7f00000002c0)="f6883cc4a368c9f8c0b0dd07203d8a2c52d873e01053b80804aae77c8e2d7d198ddbab484f271c1a8874147f262c478f92d9a11b91dd0f95eb1f5a1d1958ae0f9a288b473a9dbf1da6a27d1f1132ac9b3ba2d84c191d226dedf941e0b4d4a5e8e496f1ac60f90086fb0b5de47972c3f4caab9ed52dd334d8b1bcde98701cf847e5e78c196a71f2871e97bb869527034d1caac7b76099c56d7e0d8f54862978982fae33ce5cfc2027272688d06aa2edec13ab474be711f368412534cc3af3a4783630e6be72093e9828b268ccb04d159c1fdcee7bb5dcc65a83c3179e8587f742770fd4", 0xe3}, {&(0x7f00000003c0)="607282fb0a0c2a6dba01d9ebf8e1dcf536cadf613f8067e70d168b77fc718dd157f5d659b569120a24d110a23a2734fc86ec74eee7b8eb8622486ec43cc196b9de07b95851f7d7a58675c226d847648a49c23e0266b32869314f84be17c1944bb9f504e5679cdf0430e8ab3c21e8300193d233633f83f3d9861b6ef59c548ff8bee17a8bf62d063704751ebe73d667114b59f50633fe07ff097cb4c12dccae8cb2065f", 0xa3, 0x7ff}, {&(0x7f0000001580)="7a9b6f948b3fb13079b8a034a73ebc82591a409717fa03e6b423effe975c197f1ce45f76d5d8e8a0b823a18542a256eb28faa59b851a3e137de2f81baef369765fc975f5e138cfed1f3405527b706cee93b4fa831dce4f38f4bfc7a03cec286a4d415d05b18fa5df65951f15d5729342e50645950ee985656e2e12150fc3fb60e93f1a5d69931a3107e330b30751eab41cb3ab7394c55b1e858268fbfd70081da0724d9972c0cb0c1eee27877272216d6900a1f05fdfe02b7cd2313aff4bc476f8020b11402ed8c9c95e251bc9d3517435e2980e08b30fbd90915c66ba966f27fda1fe77744d0ff8a48408b17f549d3ad8fb4a7c91", 0xf5, 0x3}], 0xa048c, &(0x7f0000001700)=ANY=[@ANYBLOB="73686f72746e616d653d6dd8b2cd8f2c756e695f786c6111de944a71688fed3178666c6f7070792c00365b62c9843419645cfe7e61307b7660d33a3cdfcc0adc0a325b12c189d7a4f8c8fa6f99e949917568e6d51c3192cb79406760bd8386aa272b7a6249dd29dea55ef8d481cc39f811f2832a19e12fce26bf1e2fbc2db10fa076c211194d5260fd913d47b69c3f335b16ae0bf5bbd519485ce1894c5e194f46f5d7bb3e4020ace4ba3f508bc2c1e886d3630616878e32dc6849edda758b9c69de1ffb7ca1f676"]) r1 = syz_open_dev$sndpcmc(&(0x7f0000001680)='/dev/snd/pcmC#D#c\x00', 0x8, 0x40000) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="fcffffff020000000000000000"]) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000016c0)=0x410000) 00:09:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000300", &(0x7f0000000080)}) 00:09:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x9, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1035.444549] XFS (loop1): unknown mount option [üÿÿÿ]. 00:09:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x6000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x378, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000100", &(0x7f0000000080)}) 00:09:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:09:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000400", &(0x7f0000000080)}) 00:09:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) [ 1035.781148] XFS (loop1): unknown mount option [gqnoenfo]. 00:09:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x6800, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="67716e98656e666f7263652c00835ae5d1860600000021d1bee700b0e0bf8fe094efd562aa4f0000000056c597d4cfbf56c9b6c8f16d293b1550557ea9def76e"]) 00:09:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000500", &(0x7f0000000080)}) 00:09:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:09:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000600", &(0x7f0000000080)}) [ 1036.212754] XFS (loop1): unknown mount option [gqn˜enforce]. [ 1036.295137] XFS (loop1): unknown mount option [gqn˜enforce]. 00:09:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f00000000c0)="153f6234488dd25d766070ec3df82c036d07d3bb22f9070164d3793a8f9baac1650923939161524112289dcd2970201e352dce9c4a3aea819061c83db0d496319f1d32531c8e442094db04c040a4af4ebefac9024cebac0003da3cf720488f716290709bd78e923f47dc72e4569b2778df77") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='g\x00\x00eO\x00']) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x3) 00:09:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1036.610175] XFS (loop1): unknown mount option [g]. 00:09:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1036.664703] __ntfs_error: 37 callbacks suppressed [ 1036.664714] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1036.684504] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1036.731193] XFS (loop1): unknown mount option [g]. 00:09:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000100", &(0x7f0000000080)}) [ 1036.788248] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r3 = getegid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) r7 = getegid() stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) open$dir(&(0x7f0000000500)='./file0\x00', 0x200000, 0x110) r9 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000600)={0x290, 0xffffffffffffffda, 0x5, [{{0x4, 0x3, 0x1f4, 0xffffffffffffffff, 0x2, 0x1, {0x3, 0x1, 0x1f, 0xff, 0xe109, 0x4, 0x3, 0x401, 0x6, 0x7, 0x3fce6bb2, r2, r3, 0xcb, 0x8}}, {0x6, 0x400, 0x0, 0x1}}, {{0x0, 0x3, 0x5, 0x7, 0x7, 0x7f, {0x2, 0x2, 0x2aa9, 0x7, 0x5ed, 0x1, 0x200, 0x8a0, 0x100000000, 0x100000000, 0x6, r4, r5, 0xfffffffffffffff7, 0x4}}, {0x4, 0x46, 0x4, 0x100, 'xfs\x00'}}, {{0x0, 0x3, 0x401, 0xd9, 0x0, 0x463, {0x1, 0x6, 0x2, 0xd9fc, 0x7fffffff, 0x1ff, 0x1ff, 0xffffffff, 0x8, 0x1000, 0x0, r6, r7}}, {0x2, 0x5, 0xb, 0x8, "5d211576626f786e657431"}}, {{0x5, 0x1, 0xed00000000000000, 0x7, 0x5, 0x8, {0x6, 0x27, 0x2, 0xd1, 0x400, 0xfffffffffffffffb, 0x4, 0x6, 0x101, 0x80000000, 0x6, r8, r9, 0x40, 0x2}}, {0x4, 0x4, 0x4, 0x4, 'eth1'}}]}, 0x290) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0x7f, @local, 0x4e20, 0x3, 'lblcr\x00', 0x22, 0x2, 0x3d}, 0x2c) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@noikeep='noikeep'}]}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000100)={0x7b, @loopback, 0x4e24, 0x4, 'ovf\x00', 0xc, 0x100, 0xc}, 0x2c) 00:09:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x281, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000200", &(0x7f0000000080)}) [ 1037.068527] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:09:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000500", &(0x7f0000000080)}) 00:09:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2200000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1037.124397] XFS (loop1): Invalid superblock magic number [ 1037.137969] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 00:09:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:58 executing program 1: r0 = socket$inet6(0xa, 0x80007, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x10001) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="6771610ca1af00000000002c00"]) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x28002, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r2, 0x500, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3b, 0xb}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4}}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004010}, 0x1) 00:09:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000300", &(0x7f0000000080)}) 00:09:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1037.363810] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1037.466253] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1037.548269] XFS (loop1): unknown mount option [gqa ¡¯]. 00:09:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x600, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000500", &(0x7f0000000080)}) 00:09:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1037.697598] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1037.723485] XFS (loop1): unknown mount option [gqa ¡¯]. 00:09:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) [ 1037.838634] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1037.935632] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:09:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockname(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) setsockopt$inet_buf(r1, 0x0, 0x24, &(0x7f0000000140)="6e76d7d4a2bb6409195c1792b7016781febefa55b3cac99787058defa25dec40540933cb6c3cb2ad35ffe968ac9e0ebe92de6a2a75b6c2fb9ea0eccbe4e31b56357a34cf07b0e7e60e382c421adf047221bc0a7e92cb8328f422c89361768c1a31ad3595799b5ac1847f524ff00b474878c86fd25631fe3ab094e3f0fef3a069887ad29f9e7960724c6893051a48aaa599f42f2c43f5d901d8353867e5f2b71f1d7153ff5fe617ec3364d96e2f", 0xad) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:09:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:09:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffff1f0000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000400", &(0x7f0000000080)}) 00:09:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000600", &(0x7f0000000080)}) [ 1038.166463] XFS (loop1): Invalid superblock magic number 00:09:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffff1f00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:09:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:09:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:09:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x200000) accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x80800) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x80) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000004c0)=""/126, &(0x7f0000000240)=0x7e) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="67716e6f65e766417ab9bd8700"]) syz_read_part_table(0x6, 0x5, &(0x7f00000001c0)=[{&(0x7f0000001680)="2ddd67ef0e9c6fac34c1f447ad035cb45aca8161becde0c7c75a91a22c2a7b58fa1f86a577e67abf9c641353af558e9b9d87406cdd7da58d0ba3a6957e4a866b2d7ffdd7b5d71c5bfc", 0xfffffd0c, 0xfffffffffffffffc}, {&(0x7f0000001980)="c4046d412540c5dc0f35bbb5e8daedac75168076e902e06f3b1feb450639feed75b4505c054ed1818e0c6df2a780b31fe558e56ec760e900000000000000000000000000", 0x44, 0x104}, {&(0x7f0000000580)="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", 0x1000, 0x80000000}, {&(0x7f0000001580)="aa6c6a8da7db5f90be9dd2d8024383da13dddf6ba329b4219d9485f21be207495c78c1ffe3456af885a2e9e6e3b5f74b9c368372a05d2af5fb4071ad4146213367a259fe6fa848cb7d2093e8ee328e5971a17a10e8c63309aaaea5510847a3cbfe9f0455c21a5482e59a5c301e8c948246db77417d20360275f255b975230996c988373822bccf5d86216dfa58299da952d375aef43ab8a8508645f9ac5b918f2de4a85bee614946af4bcc0406c8c3402dbf33e133bcfa3ef034317701405e4f1a6a726c5f67a4aef3e2ac9ec49a297bb3ff4401517f0b8bee66712a0e29be245b372acaa5495c3f42c84b", 0xfffffffffffffd9b, 0xf37}, {&(0x7f0000001780)="a26ab3f2565a252214c31f1a4ce4f177ce698813ca77f91fa2d95155e6cb1a06a143fc2c989ce3ef3c0f6112dfe6bead96db986753018a3e0d166115dde8b04196f6ed007fbe573a2616dee473f644bc43a4993d151ae4b54c41ee8494ac6da2faea319ac18df7e33da8882450aa81a5f4a6f888035646150d6609eb2673053b310c9513ffe726f7f12a62257ba80241606ce8e808b2d95cb6c0682faafb5b8c3a3b7e625544418b83d9ee8cb553e3451f3780c9372d714ba6404f274223754e5481e986276a12934d2416ef94b1f449efd3143f401b980ba9d493f0eb7345948056d90e87920cf9514c95b6158b78900d499907931f68d8177331777b3f33b2ca026d67f76b49c13e9baf4fefcfdc7cab9842f677dc8f378b0e4059d439374c968c1e0200b109b4b4e52946c24be54ec1a14c766c75006f880c03e99394cb7cb98a554ac12d5c740a1a6d89a16a17bf76adb1bcba2484bfa8d62b533fd51703c0e6ee26d9bc2566b004e9735f8c3f70a8549662fce7cbd698d3eaa12eac8124359914c104cab90b1870e6b823a1f5f21e49811a9c37ab354136c9eb4dc5be8f284ed5c585a47f3c12a97414643bb706b70f84211f744b8d0f8e4d97e96722f41529d50925e9e878a6519bd9", 0xb9, 0x5}]) 00:10:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0xe203, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:10:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:10:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000600", &(0x7f0000000080)}) [ 1038.603349] XFS (loop1): unknown mount option [gqnoeçfAz¹½‡]. 00:10:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:10:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000600", &(0x7f0000000080)}) 00:10:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xa00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1800}], 0x1) 00:10:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:10:00 executing program 1: r0 = socket$inet6(0xa, 0x4, 0x89) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:10:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x300, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0), 0x0) 00:10:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000400", &(0x7f0000000080)}) 00:10:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:10:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0), 0x0) 00:10:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000500", &(0x7f0000000080)}) 00:10:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x3000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:10:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000100", &(0x7f0000000080)}) [ 1039.595372] XFS (loop1): Invalid superblock magic number 00:10:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") umount2(&(0x7f0000000000)='./file0\x00', 0x1) r1 = socket$inet6(0xa, 0x6, 0x5) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='gqno]nforce,\x00']) r2 = getpgrp(0xffffffffffffffff) fcntl$lock(r1, 0x5, &(0x7f00000000c0)={0x0, 0x0, 0x10009, 0x6, r2}) 00:10:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000400", &(0x7f0000000080)}) 00:10:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x1fffff, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:10:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0), 0x0) 00:10:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x48, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000500", &(0x7f0000000080)}) [ 1039.915093] XFS (loop1): unknown mount option [gqno]nforce]. 00:10:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1040.008625] XFS (loop1): unknown mount option [gqno]nforce]. 00:10:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000680)="a991ada23485e62e7016b12e1188bb21382c30695776221d31a6d5a81cff28c19ba0af3146f58dec4e3b93490e9b4093c4e2414f383ff3608b65") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f00000006c0)={0xa639, 0x980d, 0xffffffff, 0x2}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="677630355196f50b0000000000"]) write$FUSE_GETXATTR(r1, &(0x7f0000000740)={0x18, 0xffffffffffffffff, 0x3, {0x1}}, 0x18) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/psched\x00') syz_open_dev$midi(&(0x7f0000000800)='/dev/midi#\x00', 0x1000, 0x2) getsockname$packet(r2, &(0x7f0000000600), &(0x7f0000000640)=0x14) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000700)={0x80000000, 0x9}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20300, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000780), &(0x7f00000007c0)=0x4) recvmsg$kcm(r3, &(0x7f0000000580)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/255, 0xff}, {&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000340)=""/207, 0xcf}], 0x3, &(0x7f0000000440)=""/233, 0xe9, 0x2}, 0x2000) 00:10:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{}], 0x1) 00:10:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:10:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x8102, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c00000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000200", &(0x7f0000000080)}) [ 1040.311067] XFS (loop1): unknown mount option [gv05Q–õ ]. 00:10:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) [ 1040.360073] XFS (loop1): unknown mount option [gv05Q–õ ]. 00:10:02 executing program 1: r0 = socket$inet6(0xa, 0x805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000580)=""/4096, 0x1000, 0x40010000, &(0x7f0000000180)={0xa, 0x4e23, 0x4, @loopback, 0x81}, 0x1c) accept$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 00:10:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:10:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{}], 0x1) 00:10:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000300", &(0x7f0000000080)}) [ 1040.714323] XFS (loop1): Invalid superblock magic number 00:10:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xa, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) semop(0x0, &(0x7f00000000c0)=[{}], 0x1) 00:10:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) socket$inet6(0xa, 0x80000, 0xf62f) 00:10:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000400", &(0x7f0000000080)}) 00:10:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:10:02 executing program 5: semop(0x0, &(0x7f0000000080), 0x1dc) 00:10:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6b6b6b, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000300", &(0x7f0000000080)}) 00:10:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:10:02 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x2) [ 1041.213513] XFS (loop1): Invalid superblock magic number 00:10:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000500", &(0x7f0000000080)}) 00:10:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7400, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:10:03 executing program 1: r0 = socket$inet6(0xa, 0x4, 0x40000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x11, 0x3, 0x6}}, 0x14) 00:10:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:10:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x2) 00:10:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000600", &(0x7f0000000080)}) 00:10:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) [ 1041.634029] XFS (loop1): Invalid superblock magic number 00:10:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:10:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x2) 00:10:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000500", &(0x7f0000000080)}) 00:10:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x103, &(0x7f0000000000), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="62736467726f757073c24e"]) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2496266d12069c063b87a6ee98a157a4cab84877bf15799c03535f41de171909e741ce8b18d0998d1f8d3717eb1886bef25be1bf6fd802d4d47b9555aabbd6df4b9141cd0c4edc1de0d6e6328a434d41a3ffaf1a551e07fc648294f754096552552c706df1aec7c516fd8b96935e5f54010e2393cf4f6045a3760a7a3eace8fee7017e172089e72384de9a06f085b6d7c7e10c4d0258a717ae01b0d4f8a2175822f525a2962d89e908730a29cf3bd38dcbedf8655a95c69b7723a166bb6a49a095f1bf33303ba445170b289c", 0xcc}, {&(0x7f00000001c0)="cd001320f9a0922e8bb4b1fa5b6236bcb7db90ac9d59911418e8cd95a7a0bead59e103d78efcd8e824c2d784acd2aaf40ea9e52e6eb04cb63747683549e3add04a789112275949880a6516e7d172e282666e07f91dbae4ec2ffa8bb297b228d1c8d4a1375866e5d411231d30befa09437373ec047a7d72918b31d0ec9d8949af03af428029386cb3bba6cf47c6eeb15dd4422431d845b78e114d0a20184b7bb057e8a152e17b1828669f47cc3a9a0812c8255a0f0a", 0xb5}], 0x2, &(0x7f00000002c0)=[{0xc8, 0x108, 0x9, "2b8d80287d9060dddfedebdf0d8b29ccb685ba74853521bfc3c3c5bfdfd85f9927fedb64b249dc6c580568c19ae90d1b0754cdc272060a77de4302b5f1b0057b9b10b7390e4a446263d0f8c9cc17f103dd4f1e2ff1f55cf17222584f54c9c1f2bd62e245e784bf2fa207b12c10c777df8fd6bfd31e5c0331d6f18b320a58f663a297572ab799d451e491a33bf15e89b7a269b8d1a9ee38c09535ff40a3e2c7c39c569ea20dcdd2f6fc0c97df2a68db341ad3e11a10c4e546"}, {0x100, 0x117, 0x5, "e68bfb44a05518c6f615d499d6b0932fd572ef424dbde0684555288c8b9cf1eebe549264ac4bfe3065849899b62d6ab215a548f4d75fb75320c6042306197ee2b6041990f50533a773ef12496c5b8d7759ad41b4c51f75225acccccc66a010928c32864157ba1ac9442bb5c6986ccd137a0ef369e39cfc20f93e0f2a2be79d11d34badeee9be4061d9aeed7c1927d8c3f66dc840fed7e94f83eeb8e4ea9c2188980c0af223f651f26c21e4e8e3047872716dc7a2ac308168e35443cd883c1a69e5f87a557757469c54f98b5561ca88665cdfeb5c0d2dc6fea62c8acac2625864d879ec71909062775f99"}, {0x10, 0x0, 0x43}], 0x1d8, 0x20004001}, 0x811) 00:10:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) [ 1041.877273] __ntfs_error: 34 callbacks suppressed [ 1041.877284] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1041.897509] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 00:10:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x2) 00:10:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:10:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6b6b6b00, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x1f000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000200", &(0x7f0000000080)}) 00:10:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r0, 0x2) 00:10:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e24, 0x1f, @ipv4={[], [], @multicast1}, 0x2}, {0xa, 0x4e23, 0xfffffffffffffbff, @mcast2, 0x6}, 0x4, [0x2, 0x7, 0x80, 0x1ff, 0x9, 0x4, 0x0, 0x8]}, 0x5c) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000140)=0xc) setfsuid(r1) 00:10:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1042.266819] ntfs: (device loop4): parse_options(): Unrecognized mount option . 00:10:03 executing program 5: bind$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(0xffffffffffffffff, 0x2) 00:10:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000300", &(0x7f0000000080)}) [ 1042.343914] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1042.393946] XFS (loop1): Invalid superblock magic number 00:10:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", &(0x7f0000000080)}) 00:10:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7a000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1042.528353] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 00:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='g{t\x00\x00\x00\x00\x00\x00ce,\x00']) 00:10:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x2) 00:10:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000200", &(0x7f0000000080)}) 00:10:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000300", &(0x7f0000000080)}) 00:10:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000300", &(0x7f0000000080)}) [ 1042.705557] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1042.731484] XFS (loop1): unknown mount option [g{t]. 00:10:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x2) 00:10:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) fcntl$getown(r1, 0x9) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000200)="617474722f736f420100006561746510") ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) 00:10:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000000000100", &(0x7f0000000080)}) 00:10:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x2c000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x2) 00:10:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000600", &(0x7f0000000080)}) [ 1043.036071] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 00:10:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) [ 1043.164315] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 00:10:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x2200000000000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(0xffffffffffffffff, 0x2) 00:10:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1043.302080] XFS (loop1): Invalid superblock magic number 00:10:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x6c, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000300", &(0x7f0000000080)}) 00:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)) 00:10:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400", &(0x7f0000000080)}) 00:10:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x0) [ 1043.514074] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 1043.541443] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 00:10:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000400", &(0x7f0000000080)}) 00:10:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x8102000000000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", &(0x7f0000000080)}) 00:10:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x3000000, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x0) [ 1043.780462] XFS (loop1): Invalid superblock magic number 00:10:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000500", &(0x7f0000000080)}) 00:10:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000100", &(0x7f0000000080)}) 00:10:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@gqnoenforce='gqnoenforce'}]}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x408403, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000580)="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", &(0x7f00000000c0)=""/62}, 0x18) 00:10:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x0) 00:10:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) 00:10:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000600", &(0x7f0000000080)}) 00:10:05 executing program 5: r0 = socket$inet6(0xa, 0x200000000000001, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @loopback}}}, 0x108) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e22, @loopback}}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x4, 0x7fff, 0x0, 0xffffffffffff7fff, 0x0, 0x20}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet_buf(r0, 0x0, 0x100000040, &(0x7f0000000040), 0x0) [ 1044.224425] XFS (loop1): Invalid superblock magic number 00:10:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x13000000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x7500, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000080)}) 00:10:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a300000000000000000000000000000000200", &(0x7f0000000080)}) 00:10:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0xce1, 0x2, &(0x7f0000000140)=[{&(0x7f0000000100)="ec65ce6ec8b9934cb46405e9ab3f5a6dca4a98a3f8", 0x15, 0x7}, {&(0x7f0000000580)="7684469c0d2d487bfd4661793e544934751fa0ae42f70d42003efdbeb5582482c4131abe932b2c62bb20a2386edf540b41d290f00bbae1db44426acca408014ff0176f98c3b820d1b8dc3f8d3b8dfa314e5b6efdfe83776ee58f444494aaa560b0d760dbec2e6ec5b13cb09e3526ca0a4269a5f529f04cd3eae3b8ec37bab94e085b5fc29856476bc53a7905bfed8ac5a53cc37f4b0ede52da7782ca59782653649234a017de73c2af030c8ec8c0519df25c856bbee86e9a8b7d9667969d292e918f38e22719605caae07628dd107640505ba5b2eadbe1edca63f0ba175dbc9356dfc1a450f4956f4c43ddb1f88dc5cd7634304f12acf0ff7407ea786c1601d4018db0c79a06029256b045982a0feed552b69a093a08e9faafa08dd236dbe0452a8f24efc4813792882ce1255cf826de151e5869761792f974f0fc5b3ccc85c47ff044b3fe5f116470c111e4321e9b15edaefabcb105dffbefd68a4c150b6341cc64cf0b2c0ae30ae0a2bd0818648b03d9f870047b3593bb42be0328e24a82780e88904a775ac6c1c5acf6c178f99cd5aa90f405714323ba1a1ec04fe95583bd7ba73f9314bd17e117ec0bd730646155d31c92c23406c8449925fb68b03f5a949a102403342314ba68ee2cc5f41bb1b28d76751410d7c2a16f22f0633f75708e38abeb50acdc548c9bac3aead92a882fb080bfe0ea57b37023b80fe7cecf85c8a234849f2c3df1e7219ec8f6ca1a7490215cf9c53431c5e77d5b4e37f9a05b0734dbacbcd023468aa0ed176ebc3254b5be3b8556e34af39a1fb2ff15451cf9a205c23345cf45855ab2083db1bf41b63004da5d0efd9702091b8a25b2cf20fc119a334b08e9fa80dc42514fc8a15e3fd9606d1311033a4ce449de6173603de65016f4b6042fa7984edce5f771073655c44b9f799b0459360a0430799bca7a488cec1929b7be9215dc965aabfbdde387d119e9a43d178b2bfc715c319f82d6c5122d33f87ff0a3cc79814ac3318f7a4a9dfe3f054df381f6fe9e20da6480ad6aba0eed390d6a584388dbe828b050ca3a15cafb2a365f8a2f2e031e779363007eedc2e521d6bf5e1963742f46d8a81f6d7824289f43879ad87d65b8055e93f3480620593e21de948d6fc7f3842c476fe1ac63d98d9698b21111ed91a72ecb78c6aa957fdfd54b78ba40defd64f7a30bea70d7361246f1bf44f9629d81a9c8c115b8beb4a1f814ff2959ba612250c1bef54fc7343c8510d2f42f7dcf2486a481a46a68855cd8923acdd5112a03bd6b871cfb6e6e5e2d1bc1a10c3fd940333e8dfad5b48f5278fa16bea7cc1615abba658f353be7d5dabd9d8e05b321a7c00641245336e8f5d148fb960c9e2e644a040dd99f0a9d3773b4845f0f388472a57b12f258268e897da8b943bcab95e2535d1d83154a03f3ab518e135ea79c381106d488b6bc0a8f3ef4766c461b0ef5a7f8c455510a55a755dd87a2b3897097f61802b40788482cd4669b55406b927efa7a44a5d67d956d4ff8a135fc92b857c4a1b8fd19584f2a3a72ec3eacbe277c815953a8762b5460ca2dfee9ddf8eee432c729d48da45cd53e83e3a666972a944bc43c523614b77ad529dae7a7b509981cf11dc6292a73f10da9575d951d943de0b9f83763a6eddc3f2286d4ec88104049da652921bea2b42d72a11c54157c8aff74f4bdffb0129d500ffd20da31f2c8e4cbb6762a6986efbfd53e79d05603ea481f461a85c04af9f80c95dfdfeaffa2c487ea5eef93c1a2671b4cd23cf42ff679dcd0d63ef79f298ed7dfc447ed2430accda6a9702f73bab13d666aaab9539815f48da5a1a06147a6ca1f72dda24cae777dbed7828502d498f9a90124fd4ca1277062a0b2468d9620555d9af46146f6ffa7e4ffb4c4b6a3d8a73b2911e4bb69a78edccec715828689c4a21b41cb35bbdf82d7416a5c4c2b202846625d0c3ec68d5234a1f9b5439f5cd95c600c1e9d89273e0d43729052d9586ab64aae9a3935e08bd2ca2903b70a8abfba694a26c5c309597fa3cce286c327b8ddc6b3e9ec07e354c4d50158d0e8a5ecb69a7ef1962652c08aac7bb4510ab2503856da3b54428aa3c1063e5ea50c0092c96ef6a07a8a8ecac4b1820a1d228c32d96bf10aedbd0e4ba3e6cd5ef1eebe29bd59121534623406d7a68bcd4a1724a59587905d02d0ea125ddbe557044e784ecb6b1ecb60149f5619e0dc89953390a1612b110c0696b285575de220bd76881c58b839a96ff21c3963bac640d00a3fda981a4589439a531c2bf949b7b761f466bb9ad0ae1dcc6f7c16938bd2a4c17aff30e83650c1ddb3a4d8294bbf03a209a7cbfaebcea435de90063b2942e21806f72f9ccc9e9d98036ce4e4c008fea1d1faa0b2dc66f2fdd79988ec22782df17d76fd672872a2471c5d01f6ce214350f126a1babfa1ce1fce0c2851795d2d0f6c88931d32a886e2ea8f13c1c0332e27338d37df0be4d47034a869ea30b250b3b657ef5f8b8bde5b438701275770e65d451207c6f3014a36977375c5a46f121f615f45116f8fa033d729c4d6569e6b9a2722c570b88326e79ba18987456b47c424b6c89cc221b6a834e5719ea126828d402581401510afcb1e9de446f1a3c22491d5ef94ac689fe9ceed10a2b2666a5ee11f9ee00769b9ef67f9c69b28bd72699f5ad06553244632c1fc21b733ec1a4a8c99720e8a83fe395b727c5bae4d949b9bb2a9f0f7386fcba54030b881b6d9026d639223fe13959d40e86b99a877abd6490d23b29797cf998bb4675001a5ffb6b61f923f335d2d82c9f49e6c521b4d63793788ffc7fd685b7102ad2107bdfc8ae8c9e99f3bd032ad20f7d38551130c8792ead7e57a4519b5fc077292ede8bcda7271c13986504ee7b5c22acd0add340d1522d9bbafe0082d8a5b49761e7558b80b17fac30305b5f3f462d5408aa8a81eea5f79a0ab0dc5b08a5da8c7e6eb784756ed24be3c3cab4472f897f4a9be490fc01991724a03cebd17c284b1a5e392814d4e2e01aae1cbd4f0a5939c70fc7d8f0477a62f3e0a39a402c5d5acf32d0ceab76bc6ef31b338e589daddfe40c920aaecedc5831a911ab1beb2d05e7b6bc31cb7f46be299672a8b0509fbf6f951c118dc067ed7ad41ade8b96be1b55060d89f3c05a7f460b4643e16a247f222a66679b6e707c98ff43be127a11de92c56bd560b453173cd6b3246eb773dd763e9d502821865b63ed969351a05dc948d50b5de81329db34b6c42f14e85f3950b1ada395170d8e9ab28986a44b6b8f8ef4e2e2533b7dd985c7e00d73ab3adc3d44b84c5419e342d6c89e7a08307239674b9d0dcab213f8584807efa58f347d879369e2e9f454db04a1a98eecc7320ee658f1b8e21c8df8473943a65318c882921b702f3e0925f9e904a15a3fdb57ce93adc97a5b1c9e75fb264f1d5468b4d1a183bf230a17f078810e75b6ccbfb797e24c35760d06d2ddb94ca5c384ea3f9c1023e9055f2a788184a3951f97915acad5d64b0a3387be78641673115e280070a73c3c978fa0d6afa18a7e7253b37597adf3df1f21328f5924c8e2d9653a3fccb37c0f15908b43529ab3d37d8861c30bf8d3cec4366143c63cad376a91d869e840b3926ffeca5e5344b1b06cea5b5d5f53a0ad19159e3af0b47d9ab615fe2230b133cb1a75dbcb6a496c4d971d9e7d4b481d1d66d8e2a3e70fe9e370898568d75aa814062c68306baca9d357a01cb8635c13510109f607ed30198014db1f6412bcc999d31b1fb838f657cc2c5c17a03a69e796f0e0bdb5662a3463e0905d3f60692e3fb81052a69936c78147c32ee5333069083481ec63e44c5bb2cce6562ef223d6dd2177a61e078de628773fbd3549ea594bfdda421a833f9160d429e0cb21caadaf3b41adeab25907a0b33dbb82cfb387fae81e3c1fd9bae518d710018359a43ffe7dee0d8ab10236740ec4924017837fbdda94e7496cf90d6c93de282132a104f55c94ae4ebe9a577bc3014ff3ceee5e4d96304949946e9af5a1c70eca7f89ca083877860ac3f0082bbd2037ccc4f61d192bded8f308410c90bc5e917be389e57d45885f4e17d4a67d4510d74eb1bc55f5fc195633752270c8f83fff56091509c6f6281784a2afc990346046aef3179fabfd1e88e93e00d6653fc786e3ed8f1223fb0ad4008c2eb8be6c11128696abf62bfa7a244afed13eb736d6f7ac7cd69a4be228d6b76895f5eaaf842855154b258fcf4df5ae6530d18c7b80083fc7555a888a07003bf397d0eb90bf71af6ecf84180a57e023d5e89825052bf28d345362aaf4f01ea490d8309bd596c7a975a5e9a60b74b0eb33fda80a08f8f42e503b7c751cf51d78ce108e2cf42538e30708ec1f28d45326a2c50d68d9fb11c0aafb1af5cd4716e8eb2edd0d59654ca6687358d9397af6ef3f9ce2d190f76ff48040f532b9b7123b8dbc148a292e21ad64c748a9b3a6dc158ab51c010f2d8abf8f655ec5e4c677a98826e2edb3439d5ea9a9c212dc84531849104a7fa62282775036d2ba21d8d9f3329a5e7d82de44d22bfa9c890cddbecb1066122947e189f9e13eb00c5862aa9ff7a8b49667438f5af88037ab55e830c3e772161ab5bef83b01dee4f8aadef62ea4bd0cfdd893303299aefc5b6937bc666637fbb18bfdeed2189cff3c285d0e795aad79efe8341125bd9d5b973cd153f2e0fc9afd822bc5c9dd4c731b2da182c8692a162f39b62e4e08b9876a4f5f1f90a85f716246e4f05abda4b82750c6cf057fba75c0a6957de17432e5f303f956e0a3d037b41d6ae8a65aa861d6b736f5a7e17600e1a623377787fffedfd790f08f249b28b858414f544e79bca54e61f58aafd220ef125f1149adedb2e5062e000c18132c84b4b20e0ce873a1fa8a529f2708413c07afedff576d7d400e88facbd2443f2b0adc145a385c1167d2015c2bc69fb6e3574a1f203ba63734bc25aea61fc26871acc66699887ff2572dc36d6cd373a1125a7afc6deb52a18ad21723b8342f7b124cc56f771db1bbd2f7663d3848852ef667d29e84858e1eb8f9a65c980d5a9964a0b6efd08dfc57d94dc00388cc88e6d73a81aa80db04f2dc3269135fe8094ab691af31e5e5a3633201615f8b0338793b1211c8945f1a31ccb27f30fa94fe17df8afc9912b234d6dddaf312adf7c8d47c1d4ae5146e4c345e7d5b781239a5997009da9a5197b2f4751bd4e509beafb2c82cdd9134465d2a88e5899188a85fbd4b0ada241fcc34c8d3702c1d16fb3af52085f9f1687680414ceb757131dec3fb22dcff0fd27f9862bff9b5ab36599e68c94428fdc1ceffa4bb2b88dd61a67bbbc7e274c4debfa104fd29729d583e36a55624f063c54322321523b22675b5e3ce20c88d0d73ce12255bbcbaf126eade7df8952b0a31a3184e34dfd524f848bea7583e495c9865c43e2b115c40fc9fa61f3fcbe4364ad91e24033f25f0d7704eaef18cf979e582b9f9fb77016f41f4a506389f24ef748f84afceab492db5f13b343ab70ff09abcec197df50f8dba554267f7c7bf0dced04f807e0aac57159ee453d1fe3900aee1aacf5f7c1ede308b63bbb8a9bff8e85a414a6ec46ae485a21e21150f01cdebe1fb1551e9bc48a70852c57de190580583ff1acbd779730dcacb62a94df0d2a7b32ef21804227b292344c4dcc8f036876a7f9732879ab62a5ae4c711219578420048bc5a098d7e681188ac9ada41961e8cad53e9f35772a97041633a0ad6fe70adb6d43c9f86415d8df72fc5d0a67c54e13b6223d4a776c36b29f988c4b975329db4802", 0x1000, 0x401}], 0x4000, &(0x7f0000000180)={[{@type={'type', 0x3d, "a40b0026"}}, {@dir_umask={'dir_umask', 0x3d, 0x2}}, {@quiet='quiet'}, {@dir_umask={'dir_umask', 0x3d, 0x3ff}}, {@quiet='quiet'}, {@umask={'umask'}}]}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)=0x0) getresuid(&(0x7f0000004600), &(0x7f0000004680)=0x0, &(0x7f0000004640)) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() getresuid(&(0x7f0000001700)=0x0, &(0x7f0000001740), &(0x7f0000001780)) r7 = getgid() fcntl$getownex(r0, 0x10, &(0x7f00000017c0)={0x0, 0x0}) r9 = geteuid() getresgid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)=0x0) r11 = gettid() getresuid(&(0x7f00000018c0), &(0x7f0000001900)=0x0, &(0x7f0000001940)) r13 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000002e40)={0x0, 0x0}) stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002f40)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002f80)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003080)=0xe8) r19 = getgid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000030c0)=0x0) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)=0x0) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003900)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f00000038c0)='umask'}, 0x30) getresuid(&(0x7f0000003940), &(0x7f0000003980)=0x0, &(0x7f00000039c0)) getgroups(0x7, &(0x7f0000003a00)=[0xffffffffffffffff, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00, 0x0]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a40)=0x0) r27 = geteuid() fstat(r0, &(0x7f0000003a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r29 = getpid() r30 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003d80)={0x0, 0x0, 0x0}, &(0x7f0000003dc0)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000003e00)=0x0) getresuid(&(0x7f0000003e40)=0x0, &(0x7f0000003e80), &(0x7f0000003ec0)) stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000004240)='type'}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000042c0)={0x0, 0x0}, &(0x7f0000004300)=0xc) stat(&(0x7f0000004340)='./file0\x00', &(0x7f0000004380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f00000044c0)=[{&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000004c0)=[{&(0x7f00000002c0)="78b14fea708aeb78f9bcb3828de3e1e3513ae75bb9e5398b9ebb", 0x1a}, {&(0x7f0000000300)="1b89f7ec639c61a5d67eba5ee8bcd835bd013f5e7ce2b593336c7962d0623b7c7c12aa6ed951032407a8ab30a3a6adce5cefa176ad6af377fe4230530f3e77d6f637c44a4ceccb4deb76351ce4a6ee4a3077c9464ca1dace3eeb2d9ceaf3ad1a1d39b0616b7dec3b7650e5152434570d", 0x70}, {&(0x7f0000000380)="e6dd46561f92", 0x6}, {&(0x7f00000003c0)="4f0ff03bfa210c810117919fcc4e088fbfd43eb6be97fedc061c3e34db1c27b4432327faba9139da76743c78473772c3929439a226cde183097645e3cbc69e7d0e0fce09903fd1248c8194219866a0d15675d8ff186f3d1b461ff686c6e08304f257470476c59d0ca14e2786fe569edfa4a56f6b66f654e3721242e72fce4f268a9ff3b67f43ef5a5525d674897cd8e4c95addffe1317e1637b400eb972575025732b8c2e94fdc9e722f2661043376243191f91acc75ee50c2ffd180a0f78598359cae8e792160fa65f2a7125b8f4d1f6ebb346f98e41bcc0188a856e8eb04bbc1f94cda90dec024682fb22bbe5bc9ecbb9b48cbb5e1c3", 0xf7}], 0x4, &(0x7f00000046c0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0040c6c631599052255bae048ddb22ccf7c5c300", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="00000000200000000000000001000000020000003293b8c4871a19c8", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0x160, 0x4000800}, {&(0x7f0000001b00)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000001b80)="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", 0x1000}, {&(0x7f0000002b80)="bc7cfe6842039b213bf986b0063654b9b95102d84c4ef76cb7b8883b1573b95eb0f1ba2d116664b2d850c3ed59cd33effe3a0c4fd13e7d7d538508f1776fe02829b9209194a3912683cd8323ea94022ba859b08bed1a20c41eae30b17fadd4914524676f82", 0x65}, {&(0x7f0000002c00)="e7d7647244c5be9ae0c9406b78ec0265de84ccfd9895388c17e2a58fb1724336fdf59441a6d7911df88d523aef9a746e480c7cd78482c0d88bc793bfa9967a81b13533e067f42f23a0f268ee7dd0872502c13261235af30f2551c8a37caa5eb7f68b708e8a00c2a5218c462ab45d1ce87437aaf2e1c735ebec106c927567c0b9b76ec8432ce5d7daa1baee9f6a5f8a547b1f4b8a1129320f25549b238972667f8202652ef991dd8c108e826bf797e1e673d6696a8edd15a084013e7ba029a7df366e63480f4dfee56da36418749ca1a3a12dff2cb98f977b57891f76424ec7ecd53aa85959", 0xe5}, {&(0x7f0000002d00)="13df1f8fb319f238aef342bdbace", 0xe}, {&(0x7f0000002d40)="b582c4c4f183f6b32a9d4586c9d2d5f5b8e4", 0x12}, {&(0x7f0000002d80)}], 0x6, &(0x7f0000003280)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}], 0x108, 0x404c804}, {&(0x7f00000033c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003840)=[{&(0x7f0000003440)="39f19a23aaf8533254066b8f70c811d7b5e1549c28cdaa6f32d82319bb9d667be39fd9465489a1c0fda2e345cfb7be88163b0ca7a9ce53d3720699066793948a114762934f3a2d3135a349f30e875735158dce13bc5e3aaf3c65b2b83f2782c6afe6f5d993a4429e871e825b0dfaa7a2995a5569f043f8427f8165f66790eeb73ad73b861b5c02c94f8a2970b935c6eea6d50bc7cf84aca9f893eba0f85e305a153cfca2c60e5a6c3d8d436114", 0xad}, {&(0x7f0000003500)="ee9f42be65e73e9940553add8045793052e13fa7e7bf664ea47c98d10d4b7642c2ae07277500034ea0e44b9429ad76ec752042e2c2e68e8439d66816a770bc50c03b352a984bed7983a064ea1990b75bc362a78b1d4e3229879fba8760818217f464a6f73f926c8adc47e733c45bb421444857bb5ce2841838750509f1953e2069820a38d1a805c10c88b40d78dfdd122339c57e0d2851", 0x97}, {&(0x7f00000035c0)="ff2be4f4a4220d7c3ff97435ae049a9f322608af0c5874912ef8bb9b94a912857500b72595262ac75a917a3646709db4d712f3885130c1109ca430dc1933ebd8db94ce75a4cdd6c98a5478530af50c0c44f80d9d487b706a9afd4bc537d6473e1ab473cd53e83f886bee0d14d38a96cb664e0a7cf2ff1a19120963215ece87c6dca3a17e5fbfd7346a7525e38bcd8e7f32a3eea241c1606f5dc7b570c9e5ba9308", 0xa1}, {&(0x7f0000003680)="5a436579686b5457bfa884d62d3329751ff01a929eb68aadbf451acbe81d4c673d09e9f90630f4775e6c1b811be80515f1f62f816538b281b77951eeb0bc1ee93d16ba8f8fbc98abe8791959ed52254eed8bd8c393302288fa44019bae359e82", 0x60}, {&(0x7f0000003700)="03f95cbaac3f6186be3fdb8c6fa2de14a79fe9f1c868020a062fa2ef1a86c239c82d56c5650bc681369e309d1da078c6040eaf1b1cf7431381f9a7cab1", 0x3d}, {&(0x7f0000003740)="cdb7457283b08b3984df42286200b515395cd98fa68440995600538064d35d083e7e565b8575733cfaf759dcf59402ce3461fe9250b25aa919267348b11f8c597083024d5c63dd50ecbd44349036999613bb86d128addb57b7efebd9b490e7966c362c4b6119c179a5330076", 0x6c}, {&(0x7f00000037c0)="7f621b2f7aafc4fc35c73841991e0c0e905c50049ec947009b55a86963c59890eb29a0eef05ac602e8b45228347c58b4a536a8da38b6cf575e9d83da6994d5b236fc7152a2262f224f826f95c3e19eaec70ded2b7b0f017ee56585c7c656dd9efee48f17aaecd5c7004146a05c0f8696", 0x70}], 0x7, &(0x7f0000003b00)=[@cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}], 0x40}, {&(0x7f0000003b40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003d40)=[{&(0x7f0000003bc0)="ca29c6db35d8c0500f802c19fc9ae2e09cf514b3df66904eb62b808bbad85e0d63206833d9dc1dbae89caffd8921300051306981f2823760ff935aa7cdc998faf8eb5028434d395bc79c1543be8b1d2728a266b425fc97cec677f84ae8c2846fc4569fc6d17b2854821b5741ca753db82302fd5d4b019b89ea67b5023ac4d73b2b9e68c6a962ceb3f97db6990ae2d1b84066c477d93b551c49ce83d22f045fc7970515838e0959f1481c2a4bb64e06b517a8f2516033d7a433faae58dc3bba", 0xbf}, {&(0x7f0000003c80)="4d1b3621c4979c29d965deb46817cd8e015f685265df9f7afd2df4614301389b8e0671ad2560a76c143c33d9aa99b4d23f23997740b5260e6d6c23894ef6101c8dfc9efdb6b0be98e298cc20eae2c3d9d9e1f82d1cd4d10827f6ca0d024fae533b87378ff1cad3956ea8edba8e7446c0faf8da5e1cb610e8ef30615d7f383fd087c40768f6745af6ed369d62cc672e59e9e378f6a8e374ee105e", 0x9a}], 0x2, &(0x7f0000003fc0)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000ba", @ANYRES32=r0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r29, @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=r34, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0xf8, 0x850}, {&(0x7f00000040c0)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000004200)=[{&(0x7f0000004140)="bf9c467c623025baba7d6f6a", 0xc}, {&(0x7f0000004180)="2541c383d1ff42e5c7b239f2477426a1ed0c714cb970ed5353b2bc82ecbc8aa860026c105f54588793a7c5471c40f237fe28a9750a2ae5b400b93102d531e89b5f7bae9e", 0x44}], 0x2, &(0x7f0000004400)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r35, r36, r37}], 0x98, 0x8000}], 0x5, 0x20000001) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000001580)={[{@gqnoenforce='gqnoenforce'}]}) 00:10:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000600", &(0x7f0000000080)}) 00:10:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) 00:10:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", &(0x7f0000000080)}) [ 1044.542124] hfs: type requires a 4 character value [ 1044.587628] hfs: unable to parse mount options [ 1044.668672] hfs: type requires a 4 character value [ 1044.675208] hfs: unable to parse mount options 00:10:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", &(0x7f0000000080)}) 00:10:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x3, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73797a3000000000000000000000000300", &(0x7f0000000080)}) [ 1044.720924] bpfilter: read fail -512 00:10:06 executing program 1: r0 = socket$inet6(0xa, 0xd, 0x4) ioctl(r0, 0x800, &(0x7f0000000280)="153f6234488dd25d766070") pause() openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='g\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 1044.750890] [ 1044.753129] ============================= [ 1044.779945] WARNING: suspicious RCU usage [ 1044.801266] 4.19.0-rc4+ #28 Not tainted [ 1044.813270] ----------------------------- [ 1044.841800] kernel/pid.c:330 suspicious rcu_dereference_check() usage! [ 1044.889231] [ 1044.889231] other info that might help us debug this: [ 1044.889231] [ 1045.260837] [ 1045.260837] rcu_scheduler_active = 2, debug_locks = 1 [ 1045.271075] 1 lock held by syz-executor5/18213: [ 1045.276987] #0: 00000000a44a6bcd (bpfilter_lock){+.+.}, at: __bpfilter_process_sockopt+0x1d0/0x387 [ 1045.300238] [ 1045.300238] stack backtrace: [ 1045.307126] CPU: 1 PID: 18213 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #28 [ 1045.314415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1045.323773] Call Trace: [ 1045.326387] dump_stack+0x1c4/0x2b4 [ 1045.330488] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1045.335702] ? vprintk_func+0x85/0x181 [ 1045.339616] lockdep_rcu_suspicious+0x14a/0x153 [ 1045.344299] pid_task+0x1ce/0x200 [ 1045.347775] ? find_vpid+0xf0/0xf0 [ 1045.351368] ? radix_tree_lookup+0x21/0x30 [ 1045.355612] ? idr_find+0x44/0x50 [ 1045.359088] shutdown_umh.constprop.0+0x33/0x7c [ 1045.363769] __bpfilter_process_sockopt.cold.1+0x9b/0xa0 [ 1045.369235] ? ipv6_mc_check_mld+0xff0/0xff0 [ 1045.373670] ? __fget+0x4d1/0x740 [ 1045.377141] ? ipv6_mc_check_mld+0xff0/0xff0 [ 1045.381569] bpfilter_mbox_request+0x4d/0xb0 [ 1045.385997] bpfilter_ip_set_sockopt+0x33/0x40 [ 1045.390599] ip_setsockopt+0x125/0x140 [ 1045.394505] udp_setsockopt+0x62/0xa0 [ 1045.398326] ipv6_setsockopt+0x149/0x170 [ 1045.402421] tcp_setsockopt+0x93/0xe0 [ 1045.406240] sock_common_setsockopt+0x9a/0xe0 [ 1045.410756] __sys_setsockopt+0x1ba/0x3c0 [ 1045.414922] ? kernel_accept+0x310/0x310 [ 1045.419001] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1045.423602] ? trace_hardirqs_on+0xbd/0x310 [ 1045.427938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1045.433320] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1045.438797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1045.444366] __x64_sys_setsockopt+0xbe/0x150 [ 1045.448795] do_syscall_64+0x1b9/0x820 [ 1045.452697] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1045.458077] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1045.463023] ? trace_hardirqs_on_caller+0x310/0x310 [ 1045.468056] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1045.473086] ? recalc_sigpending_tsk+0x180/0x180 [ 1045.477857] ? kasan_check_write+0x14/0x20 [ 1045.482117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1045.486987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1045.492184] RIP: 0033:0x457679 00:10:07 executing program 5: r0 = socket$inet6(0xa, 0x200000000000001, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @loopback}}}, 0x108) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e22, @loopback}}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x4, 0x7fff, 0x0, 0xffffffffffff7fff, 0x0, 0x20}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet_buf(r0, 0x0, 0x100000040, &(0x7f0000000040), 0x0) 00:10:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r2}}]}) 00:10:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$ntfs(&(0x7f0000000780)='ntfs\x00', &(0x7f00000007c0)='./file0\x00', 0x4, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, r1}}]}) [ 1045.495392] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1045.514302] RSP: 002b:00007f525bf75c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1045.522034] RAX: ffffffffffffffda RBX: 00007f525bf766d4 RCX: 0000000000457679 [ 1045.529319] RDX: 0000000100000040 RSI: 0000000000000000 RDI: 0000000000000004 [ 1045.536609] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1045.543895] R10: 0000000020000040 R11: 0000000000000246 R12: 00000000ffffffff [ 1045.551179] R13: 00000000004d6150 R14: 00000000004c3f59 R15: 0000000000000000 invalid request 0 [ 1046.560459] IPVS: stopping backup sync thread 8221 ... [ 1046.582710] device bridge_slave_1 left promiscuous mode [ 1046.594079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.682027] device bridge_slave_0 left promiscuous mode [ 1046.687591] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.850534] team0 (unregistering): Port device team_slave_1 removed [ 1046.885592] team0 (unregistering): Port device team_slave_0 removed [ 1046.937511] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1047.004577] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1047.152272] bond0 (unregistering): Released all slaves [ 1048.546487] IPVS: ftp: loaded support on port[0] = 21 [ 1049.068570] IPVS: ftp: loaded support on port[0] = 21 [ 1052.847020] IPVS: ftp: loaded support on port[0] = 21 [ 1053.780115] IPVS: ftp: loaded support on port[0] = 21 [ 1053.844764] IPVS: ftp: loaded support on port[0] = 21 [ 1053.846307] IPVS: ftp: loaded support on port[0] = 21