\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x800, 0x2}]}, 0xc, 0x3) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000180)=@abs={0x1}, 0x6e) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f00000005c0)=ANY=[@ANYBLOB="098000000000007f0000000600000000000000660c0000000000000101e100000000000000010000000000000000000000000000004000000000000401000000000000000000000000000062d0000000000000ff0700000000deff0500000000000000000000000000000000000000010000009c3a00000000000000000000000000009d000000000000000000008000000000ff07000000000000000000000000000000000018000000000000000000000000000000000000002e8d7b0049c30000000000000300000000000000990000000000000000000000000000000000000103080000000000000000000000000700000000000000ff7fffffffffffff000000000000000000000000000000000000000000000000020d000000000000000000000000000005000000000000000010000000000000070000000000000000000000000800000000000000000000000800000000000000000000000000000000000000000000000000000067d95b65a68ff45ff162478e2bda89f5c35bfaf91282b39fac211fcb271cb68435a184a5082fcbf9a608985152f5897544b89b6454413011b39ae7482281e5f44530f161c1511424f3e752df5c3dc56c6e1d8149efbeadcab50f5978fc448aa8ef285f"]) 20:40:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x4b, 0x0, 0x0) [ 1194.943395][T19880] device nr0 entered promiscuous mode 20:40:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband\\rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfp\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x4c, 0x0, 0x0) 20:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x4e, 0x0, 0x0) 20:40:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfu\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:26 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000000)='fdi\xf0\xec{nfo;\xb6H\xb7\x84\xaeej]T#\x8b\t\x11\x99\xb0\xaf\x03^\xeaC\x89\x9e\xb8\x98\x94@\xf7pf\v+\x9d!\xb6\xc8\xddAH\xc1\xe7\x06\xcb\x1b\x1d\x9aA\x1d\xd2\xc5\xf9\x91\xa3\xf1\x00'/79) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r5, r9, 0x0, 0x1) 20:40:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x4000) [ 1196.150444][T20299] device nr0 entered promiscuous mode [ 1196.153184][T20350] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[20350] [ 1196.182033][T20350] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[20350] 20:40:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x40000000) 20:40:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfx\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband//dma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0xa4ffffff) [ 1196.475788][T20350] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[20350] 20:40:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0xffffffa4) 20:40:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) r4 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r5, 0x0, 0x1) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0xa4ffffff00000000) 20:40:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x9, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket$inet_sctp(0x2, 0x8040b855fc36567d, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) bind$unix(r2, &(0x7f0000000180)=@abs={0x1}, 0x6e) close(r2) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) [ 1197.141926][T20590] device nr0 entered promiscuous mode 20:40:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, 0x0) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000100)=0x19) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000000180)=@abs={0x1}, 0x6e) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r7, 0x8982, &(0x7f0000001640)={0x1, 'veth1_to_team\x00', {}, 0x4}) dup3(r6, r5, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r8, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) setsockopt$ARPT_SO_SET_REPLACE(r8, 0x0, 0x60, &(0x7f0000001140)={'filter\x00', 0x7, 0x4, 0x480, 0x118, 0x258, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x687, 0x3ef}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="24a408eb1806", @rand_addr=0x10000, @loopback, 0x4, 0xffffffff}}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, 0xff, 0x0, @empty, {[0x101, 0x80, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x1fe, 0x0, 0xff, 0xff, 0xff]}, 0x6, 0x40, 0x0, 0x2, 0x900, 0x401, 'veth0_to_hsr\x00', 'bridge0\x00', {}, {0xff}, 0x0, 0x100}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x21}, @mac=@local, @remote, @rand_addr=0x956c, 0x1, 0xfffffffe}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140)=0x80, 0x4) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000240)="c2c1e34dbdf707df0794a6d5978634ea748d3fa9df34eaf34b12d44c490b88ef914bc7494f51b254913695df134ea7d834892a4e3a4230b2be971feae250f4e1bc3484edfdd1d17f8a8aba4fb4d9104da620bfc8e0cb20f6f7d0a0aa0f3af031d1abcb52218e54fc8484a3af9d21028c2f83d3afce54d236a616defbd5c50a4f59302342c36ea7ebd7f6285374d2686c851e1de4789bc7a014951cee8d38bd3fa78172bba8716840aa85a14655f51f2e526a202077ad5f3d192c2455770242a4587106e14466da1e8774109918a861cb90182f32862b4c4af81aafef37f501f1f345d3545eda4a1e3b12d3f3b4d13a98719014aa1e98d5e15a86a26e470301c279d827fc3983c7f22d8eef2c0ca8ab97fcb6b7b749f54ad8aa995128f884d674e6d4ea3ca947e7c82b77da757d949e5bcebe77cc81ebf05e78415af68de1700804523895ba74234dec4d3111a6c9337a4ccdf5de082fdfa631aaf9fd10a9fcfab0d4252893a10cf32d070242f92224fccab1d01c42bf160da06a9c04c45bd023279fdd89bc9a4b4c94e685d35453ceb137b9ef16c3c3a7496b668432509ba764b61e20f8fcc27600167294420d364de6ea5b2bf347a7a773e95f0c71250e1df156334e971ec8614dba4342ea43b81dd785f3b94314d2f10cd1bda8d2f0d40c355867ae05eee50538d0587407e4275370b3e84b2d80c0e8388f5b10e9844a6519f92b56be286d05ac984c075f70ba43e0ade13867b4a526af4b80da0786567c19977a2c52a2c8b00ed311a14e7154edcfb3fa17c834c466325d10fbe360f8599ce4ed6677143c69e70728dff5c1b23c5165222bb6bb352c7c82956000816e87f63b2f1ab3d50f0ee63ad780918344947187ef7d055c7d94570602544b4e8212b54792fa206df513a744364ab0526c3305ac51ee17ccec4d09e4b4d0672349348be6bca6ece8954331d426b5380c61e84d8576e600c31db96ed0b61da37dfe681f91b6ae4d829ca42bf88c0eaa92279b4d7429e21cecf1ff0764993f18b04e077707a9357db1bbbdc902fa101ca459409154754c27a0b58619ceed470140a167fbf126a4f49fe90193bd31a265dfa478b8831a4cce6b87aa1ed8bca17e62b25e9c51b3c37dcd8ec3ae235c19f2afe7220c32c7acb27eef13a9298301d9447246e015874f76a27fe2a1443104b0b49b91cb2cf898850fea1ec46daa9626f8c374b5298d1e643a83275a0b71c16ca82d0583acf3e663a820e8b8808c0078165ab97a45722c274d4445bfcee177d1dfecdee173bf5e7b0b5d548ce89e2dd892c3743857e5e7a98cf03a395715c5773157c38059db9aae1bc73b74dccd23c5e2095b9922ab9e79a1cf10e775d2f916c6a2fa32d061d2f10c98aa45959490d305634ac2ec52b39eb7373e93eee96c936b7fff3f30f6c0f9415905282f862d60b84cbdf7af746e48ea17b69d8c623055388e8751561d1aeb9b465ceaf2caa2c874fc95ceecd1b16b97cdd565621ba7e4377f8ae48f0bf7d750bf9b956bcc2e0ac7bc1d7a74e1cc9b988328e4019e8ae50198e2fac861b4cf368bb772fd551a89fa19b48bf783b7c0f21597b610750a07e13ca4219762f5d30a613373dae57847c325469dfed846892c592fbbca21db71cd03296d745d3a61ecb377a3cfcac4d8c93988c2ceda3673b775455bb4c894ee8ace14da5a839ca2deb96dbccfb71547e5b84dffb0748e70bd2aae764b5c5fa70a767be388a0b0fbf7362717eaca1e4798d95742c5cb8240e62040ee7be044e33f3969f714db697f8b04412247bf5190dca00be5fbd7e3a88e848bd94fe5bf3ac2a099426d96753166a3858753a906ad53a1ad1907056a9c883f715477017535ef0f4909f8ceed9d5c96d539fea13357323ff7918dc489a9930d899d907ce9d363074e71f0c0086c511f9df6d149a0ca866893d4206c5554b9381f75a3a0bbf92d72d237a5435122489c347072b2f36cb93fd8f5d55ae0c361cd1057cff4d8282fe5327864ab8bc4784002583ecbfb1fe313e43ff4c3d3dde0ce55bcd4d47a78735b04b5bb675f465ed53ab2064aee8cb1ff833e6879e8d6260613782e9024be74ea3cfaf296d73791a6e32e034bd57501c4f0c056b5c7fd403df5f6f8619bfe3376bacb0224478e9d3aac298ca9b8d6a6b371c0dcfb84f66fc53e98370d3683e7a02164c19685fe70caf867a772aba1431e39bced0c101701768bfb5a4dbfcc4f4ed37e7adaf67735328507e807d47a983ad2365cab6da4d59a2ac3236b349fd7327e27884dbeca029836b824bddca11f21fffee65e09f28407bc2958019ed8590ebae9f13a58f09a1523114046682ff6c240be0957aee8ef1e01968b19962bec43236701cd323083fd637b23fdff9fe54c60a65a30462448a02504f6c8b0fcb7c60eaca0a9930a6998415311ee5d749228e6fb397228515bf58c4a271052cfc955211aa05d4cf2385979ee5ea7d8e7e3bb883ad3391f0491c061ad50debda2792b32651d9017b3b1b7e0c5c0bd396537bc3888a53897ff03e29661f1219743a4bb8ecc44789e62afdc820d504d541b3b359fd1d8500743291e4044c40619b617be01c25c9e07084d298e75c5789458a5a7919949fc1add98752000e72dea13b40131e611c62af8a916bd728275fc1140e2187afe6cf54d4f8d71859ee3f89f42b9646d945b906f96098e0fd25eaff2790627c1ef5cd7e0300c699a13b57b573f3fcc398df6f50b7fc5580037bf71c96ae3d5b12c8b77c53e0c9af3f70cd063a733bd5066629d9743e596f64e969337644a9b2e19f5fd4c43880ee4f3cce78ae665608b3f8b9470ee8f65fefc1b7d0c0fa14bf7758020aebf48b048e336d007cc1634ece55efd984594189f784bfda1b65d6a2729f16df8820673b4993a35adc03b72f3ef057ff5d53e959dace0ad494228f9f6462c4fc468c354b09d740bc80678309267b08898e90c4d4390997c1b7b087f5778249c4845421f87d76076c8cf5f7293bd908bb817459fada99f0391c726c20ee195bc9abde7aff57fb9f8e3b16147da10846b661747f519f849843bbd7c755279a57292e62204e85d922aff404d84a29ce5d30c13b51352a1e8301492117628e4fa9bcaa5a9887b6c6c5f48fce90b5efeea55795d75c5beb1d4aeef84a731a4ae6f54219eff0eeff8ed6fed451f348d6972e69762669a4e2b5bfcdd4d272369e2ee74848ff026f01793476a4f33094dc4a7b0a3ab23c4d446e2d6b5542cbc8e1c2c8246396a990f682947b567c50a0bd0bdfcd790c35985a3f6afc8d5a637ab661856daea6189bdaefeb0779f64439a53931e881ee2b1b358765cef848eb303cb87b51a584bb99d224d3cf646ad6e9de88fd84dff2607e04411c6ad8508e818cc548f8e9baea690ce41e2a84c55f206877ff86c7640f50042d3d434195132202b18c79484578bb92012009cfabe3fd2f081adc0bb7497ca61f2ebd0a6d1e7ce9fb6c26c8234b6fa7f8cfbe416c3f888ee0ff345e0631b0bf1687d9f2b156309caf437a407cffb63a2a973f0a8e814c5ff3edfeb2b2d0fe14da8dfe9f36ce123e9415217a3cb00ad04a6b33c1d1960b060d7f9f349e7f15db0885db14d25e435d83b6deeb04616bce117457ee8127d23f0bac3c52bd061e7a5fc60ac0003f32401ce0a3f5f9fa84c528b80962d36327736fa89456a505f85d92b0abf18eb5bb81a7442ded1ce2b95e9287e2905b87a9962c920faae71eb32e81feef354b1d5978f56885a5373dba11b79be86e9f8fcd81d4b4a65cd304b52707c8a25d0464b3933d744612fcbf093754d9cdbac4ae49ad0b3b0b1a0d29b1c529d2d7ba47a16b7f68dc9f302dbfb6f2bd7bbba301964a45f2a6edab121e1609a831dc20ad9d2d91daba9b12c90589ac4e94c2f0073ef748d355a4fecfce9f3ad27e5316c1e3b8e6b72d1c50d30156c7478a71f37780f7d09bd4d65ccb71ea29534bb454d944245abfca19f9cd2625dca0fd15a9b5884e2202eb5cb647505c7908f07ca2519b62b9345dc62c53abf59d515e9a6cb35905d96e8666ca5f9eed3a84f69cebe509f1465aa7f18359041771920955af222382060cb18ee0195a37277c0ded256c14697c5e50f59654780545b30d556b85fbda6548b2d191eadf97f97ca42942d21a362f0742535c656eef95020f42a8914e09fcc515f6243e17e4909d13c20695f4daf2285cd09fc5970bd698f9374281217fe47cedac91a0abb3f80f18540c2193131f9efb9098957b1b0a17d2b6a18fddf5959161720f121909a6e981e658133931a8c55cadfa778b60905adc3dfefabf02c1018328c39a4fa765e5f484ef11e47ae33cc29d09983b19d2e9118d108451c31549e418202b8dd54c548affd6ffe624fd758d3bd9b5fd9a8710480b0b339dfb56a7230078fd41b0c02b4fedd13ac58799ee9ff0a37a6a7f27a5b8b86e81f01ffec5f9ec9ff27eef1ff77d2e37fd657115ccdbac83418518489bd3ec6e5d3e5375288ab3b29c62f2650bbddd559ac83bf745fca8cb8c7fa4c0a18616fcb5f99da5d79b9908525dcc7255be00d15e5ccfb140e3030316f76687287fa41d9e4f8b07942807c7ae88b59dd5782e825feaaa655cf292e3df5abd6b93f786f39bef14e7c4354863ad4aa222d2ca2fcb1633613309d7746ebe2b406e80a74cab065cd64ce3d076ab1429409a63228675a0663e7b9da0c35683514254e1a19796856c2a6d8a2a7daf17be34c214c5422aadb1f3adcfd506e135a52a13e1177af705f73f08431a7c0ba845286cf5635edceeec74b283b373d37a5418f84a9d4365622296237ec4eccc156483c2636a0d91b2a64adfb8eff3a9b6284b801d1d26d3b04b9774012991e3e3ae0e213908863e09bff797d2eea7075e820043b3a62a90ae9091aa7dbcb7085a69ba39b73e61fc06a74ff85dc91ef20c69cf6e7bbb5d22f4e052dc62cfd32c6d4e1ed29505a5003207cbe95899ce5c3fa3ce789b2ae3a47e3a4ff3282e848dc377443a1fbd4a591dc21e2c3a2781adc28cefb4322572c109103036590ffbb276a2bbed7242bdd2afd15f0ea9b4604c42100fe983aa7517a7105abb593a3264023759417d45bdc929987bb9591ab3032a32c85c94db76c208a347850f41d418fa4f5c13a5c77f8e2037a00464f114e38708d573492352599bf1bd8645ac871e2321ba0efcdf8c6549ed05d2f60bce84f73f377ce3f08a91e375cb84c3d1101f379b64901b0ce426b9e5390cf14cf347d17e251e794403c9dc05169ebad35794591f522b93a1875556363a703a6e503162d9915fe26face3ec26a605e23a691160fb89c6dba9e35a9865f61fb80f5324b18586aab67173f24e958ce4641c4c5abf3218da3668807e6cba2185efc0ea10fd6837f5b026b9f052ab77e5c7c32fe40b8f0f356232f6c", 0xefc}, {&(0x7f0000001240)}, {0x0}, {&(0x7f0000002240)="7f2be4bb6b40fc62483e10ca796d04694fe1d84a8cb319ebb5cfcab449a4e8bdb14d87cef8312116eb3cd1f4679539749c225f63380205f3a9208a1c80737eb144c616e582fca682c052257f588a8a604c18370e63d25af4ab6a993414f4f484a5582dd897f1fa", 0x67}, {&(0x7f0000002300)}], 0x5) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000000)) sendfile(r0, r4, 0x0, 0x1) 20:40:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/r.ma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="0000341666e41f0000"], &(0x7f0000a8a000)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000600)=0x10) setsockopt$inet6_group_source_req(r2, 0x29, 0x17, &(0x7f0000000200)={0x0, {{0xa, 0x4e23, 0x1, @empty, 0xbb5}}, {{0xa, 0x4e22, 0x2, @loopback, 0x9}}}, 0x108) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/r/ma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x04', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/r\\ma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:29 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0xfffffffffffffffa, &(0x7f0000000180)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000080)=@abs={0x1}, 0x6e) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r5, 0xc0506617, &(0x7f0000000140)=ANY=[@ANYBLOB="030000000000000057f5ff8d137c97a45618b788e33f723ebc5e5fca98cdd21ca0c8be00000000000000000000000000000000000000000000000000000000000000000000000000000032272d5868d1943627241f6333cd8e747cd8f85a8d21c2d831772f7b0d5f5a5e2498503de5285e6745aed440d77210e0cc03ccd8d046b0b3c0edf51624e2ffabb1c2b1b39f77fbdf4a742b916c7560856ad7dda480fb9258c1fafe941f3248c8e944f21e411720f609cd000000000000"]) sendfile(r0, r4, 0x0, 0x1) 20:40:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x05', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:29 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x2, &(0x7f0000000180)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000180)=@abs={0x1}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000080)=@abs={0x1}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000180)=@abs={0x1}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000180)=@abs={0x1}, 0x6e) r5 = dup3(r4, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) syz_open_procfs(r7, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') 20:40:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rd/a_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1198.387308][T21320] device nr0 entered promiscuous mode [ 1198.473959][T21464] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[21464] 20:40:29 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefe05713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e8da03defea2fdb2627a1802b5903c72ec396e4ce2a9afd95a2470bb5eed83bae264f8ba397acc482aec705937040ea07e65ef45ebc98d3de1da715da4ad8f737e7f0316563b7ab9456c82c4fd379166bf2baf2045d82c677d044d25f3f36c5602e825d"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x06', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1198.826519][T21464] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[21464] 20:40:29 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000200)) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') listen(r0, 0x7fffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) 20:40:30 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\a', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:30 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f0000000040)={0x0, @src_change}) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000180)=ANY=[], 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f00000005c0)=""/4096, &(0x7f0000000040)=0x1000) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000000)={0x7fff, 0x0, 0xfffffffb, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) 20:40:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdm\\_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1199.476630][T21637] device nr0 entered promiscuous mode 20:40:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\b', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x4e24, @rand_addr=0xffff}}, 0x0, 0xa8f, 0x0, "98fc42954811c219358da0d606789bde5a3446c3a6c90fe1ddfd467f47dd8d1e72a7743f31d953f7be6cbeeebd6b467a32802617b695d857b7c3935c94f135398110de553fb6f447e32a78ebd7bb1e63"}, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e21, 0x6, @mcast2, 0x9}, {0xa, 0x4e23, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}, 0x2, [0xfffffff8, 0x400, 0x1, 0x9, 0x6, 0x5a54, 0x3, 0x401]}, 0x5c) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6(0xa, 0xa, 0x1) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r3, 0x29, 0x39, 0x0, 0x0) 20:40:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma\\cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:30 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/de\x03\x00\x00\x00}#\x00\x00nderD168\x00', 0x400000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000200)={0x0, 0x0, r2}) 20:40:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000080)=@abs={0x1}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000180)=@abs={0x1}, 0x6e) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB="59edde7637cc40629674edac35dbe593ad73ec6a8d7f66adc77b4d000236e840b3d6d2fd2bfd5b9ffd"], @ANYRESOCT=r3, @ANYBLOB="049444ab908436b7000e87addb05350f520797883a71626fff455fda786c534671ed7121dad8720942d280b982dc889b9cf8a5255fce208c5dc105f167adfa737ea8f5bfca8cbffa78c01884e8a7659596d61b23a9357b9f3c93d466126a736c0d1ccfeccd5b2f31b99aa6e27b516983ecd8a6ea3be0e0eb9ac4ebe731d96323021caceb72b43c37dbafcf2ba7a339b231f01f7fabf2d92016934cd001557479a208569db76532a6b1466fee5938c6757a53", @ANYRES64=r5, @ANYRES32, @ANYRES32=r7], 0x6) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:31 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}) recvfrom$unix(r3, &(0x7f0000000180)=""/115, 0x73, 0x100, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x80, 0x4, 0x10000, 0x7ff}) 20:40:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000180)) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x26) fcntl$setstatus(r3, 0x4, 0x400) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000040)=""/253) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) flistxattr(r3, &(0x7f0000000580)=""/202, 0xca) 20:40:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_\\m\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\n', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1200.691290][T22203] device nr0 entered promiscuous mode 20:40:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@mcast1, 0x39, r2}) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_c/\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\v', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f0000001940)=""/69, 0x45}], 0x37d, 0x0) r6 = inotify_init1(0x0) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000000080)=@abs={0x1}, 0x6e) fcntl$getflags(r7, 0x401) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r9 = socket$unix(0x1, 0x2, 0x0) bind$unix(r9, &(0x7f0000000080)=@abs={0x1}, 0x6e) r10 = socket$unix(0x1, 0x2, 0x0) bind$unix(r10, &(0x7f0000000080)=@abs={0x1}, 0x6e) recvmsg(r10, &(0x7f0000000400)={&(0x7f0000000000)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000640)=""/140, 0x8c}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/65, 0x41}], 0x3, &(0x7f0000000800)=""/4096, 0x1000}, 0x4) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000001800)={'team0\x00', r11}) r12 = inotify_init1(0x0) fcntl$setown(r12, 0x8, 0xffffffffffffffff) fcntl$getownex(r12, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r13, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000019c0)=""/77, 0x4d}], 0x1, 0x0) clone3(&(0x7f00000005c0)={0x10000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000001900)=0x0, 0x25, 0x0, &(0x7f0000000240)=""/231, 0xe7, &(0x7f0000001880)=""/104, &(0x7f0000001840)=[r15], 0x1}, 0x10a) r17 = syz_open_procfs(r16, &(0x7f0000000140)='projid_map\x00') sendfile(r0, r17, 0x0, 0x1) [ 1201.218023][T22637] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[22637] [ 1201.258502][T22637] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[22637] [ 1201.378382][T22635] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[22635] [ 1201.425246][T22635] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[22635] 20:40:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\f', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_c\\\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0xaa52715c42774bc9, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000280)={0x73, &(0x7f0000000200)=""/115}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r2, 0x29, 0x39, 0x0, 0x0) 20:40:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r5, 0x100}, 0x8) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) setsockopt$inet6_buf(r7, 0x29, 0x39, 0x0, 0x0) 20:40:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\r', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1201.926547][T22685] device nr0 entered promiscuous mode [ 1201.956709][T22637] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[22637] 20:40:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x02', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1201.996848][T22704] sctp: [Deprecated]: syz-executor.0 (pid 22704) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1201.996848][T22704] Use struct sctp_sack_info instead [ 1202.014797][T22637] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[22637] [ 1202.030106][T22637] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[22637] 20:40:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x0e', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r8 = dup(r7) write$FUSE_BMAP(r8, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f00000000c0)={0x14c}, 0x137) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r13) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r15) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r10}, 0x2c, {'group_id', 0x3d, r11}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r13}}, {@fowner_lt={'fowner<', r15}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r16}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r17, @ANYBLOB="020002004dcb2f2a0321f6f8e53c03ffc521dedc43e8aeaf516def3e41430e7a", @ANYRES32=0x0, @ANYBLOB="040003000000000008000c00", @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="100001000000000020000700"], 0xa, 0x0) write$P9_RSTATu(r5, &(0x7f00000001c0)={0x25c, 0x7d, 0x2, {{0x0, 0x1c9, 0x9, 0x56, {0x3, 0x3, 0x4}, 0x40000, 0xa99, 0x6, 0x7, 0x1c, '\'--bdev]+vboxnet1vmnet0]self', 0x152, 'clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f', 0x0, '', 0x28, 'loprocsystem]md5sum$-]trusted.]@vboxnet1'}, 0x7e, 'oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9', r6, r11, r17}}, 0x25c) 20:40:33 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x81) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x10', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0xe337) 20:40:33 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x6, 0x7) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x1) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$RTC_PIE_ON(r2, 0x7005) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x03', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1c', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:34 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @loopback, 0x6, 0x3, 0xf3, 0x100, 0x7, 0x40000101, r3}) 20:40:34 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8a, &(0x7f0000000140)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f0000000240)={0x6, &(0x7f0000000000)=[{0xfe, 0x2, 0x7f, 0x6}, {0x4, 0x3f, 0x4, 0x7}, {0x2, 0x9, 0x4, 0x719e}, {0x2, 0x54, 0x1, 0x6}, {0x1, 0x80, 0x80, 0x2eab2899}, {0x9600, 0x40, 0x8, 0x10001}]}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r1, r5, 0x0, 0x1) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x6, @mcast1, 0x40}, {0xa, 0x4e21, 0x5, @rand_addr="c62f20c1d0d1bbf1e81a543d634dae93", 0x5}, r2, 0x7}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000280)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r3, 0x29, 0x39, 0x0, 0x0) 20:40:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1d', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x04', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = dup3(r1, r2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, 0x0) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000100)=0x19) dup3(r6, r5, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000240)="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", 0xefc}, {&(0x7f0000001240)}, {0x0}, {&(0x7f0000002240)="7f2be4bb6b40fc62483e10ca796d04694fe1d84a8cb319ebb5cfcab449a4e8bdb14d87cef8312116eb3cd1f4679539749c225f63380205f3a9208a1c80737eb144c616e582fca682c052257f588a8a604c18370e63d25af4ab6a993414f4f484a5582dd897f1fa", 0x67}, {&(0x7f0000002300)}], 0x5) ioctl$VT_RELDISP(r5, 0x5605) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r7, 0x0, 0x1) fcntl$getown(r7, 0x9) 20:40:34 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008916, &(0x7f00000001c0)="0805b5d25ee27f8d962f6e") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x45, 0x0, 0x0) 20:40:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:34 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs<', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:35 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_dev$audion(&(0x7f0000000e00)='/dev/audio#\x00', 0x4, 0x42) connect$netrom(r1, &(0x7f0000000e40)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}, 0x48) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000180)=@abs={0x1}, 0x6e) sendmmsg$sock(r2, &(0x7f0000000d40)=[{{&(0x7f0000000240)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)="509306b31a7f057a0ae38b170711957ee895c3bf7f65008ecaf3b44f5ba4c541415ff05471f6f3bd5b097ef97938549c7d789e008dbd335ab529287141bffc2a2be5943469cc0ad1930a565b6f533c26bcd7ee3badbca79c527899b6a1dbaf5f8fc48d3c2b43a17d9d8fc8a8e690666c8fb3636e6e89a824e46a6742752aaaefc54e59c3f943a75a3ca6a81ad37f3e9d6492c2e2347550ac05b2b885ea2a4289292936de922532ec377fcb38785cb0f7abb97a84496c173923cfc8eca378f305150f1a75", 0xc4}, {&(0x7f00000003c0)="59ca4b0759ab5f164d815144122cc9f0ba9a944b99def387e6b91deb421a8b02c5708f9530a3b80a22a18b37fe59ac8db140631a07511a9dbaeb5deb28b289342842e18570f21668f16fbeb66448d74d8c3166281a61673f0ead910e57d00f3dfb2a8ee5abc29973b138d5467873862426a4080f6858a7eb26e26657d455dc98751bb587b45314e2e6d3cdd81285cbe04994707b96d8003e93a6bbd5d92f026211794617feea1a60cc523903423b7523d11f1ff17b9fa61eaa6dc0a521909e59e58ab3c9a27df3186d742f77d82115", 0xcf}, {&(0x7f00000004c0)="96a48c7ca11de1fcb158b14f7873778f320686fc5f3eb88a744877e11fccb46e050ca9d134241a1ba221d3f0a7fde5e79dfa009f538595c36e", 0x39}], 0x3, &(0x7f0000000540)=[@mark={{0x14, 0x1, 0x24, 0x200}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0x42}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000005c0)="fdc1271c7f25c5038ca488a9dd4ba7f52857476d1b565b", 0x17}, {&(0x7f0000000600)="a7f00f76b6f8a40cce7fb57a130018a609b4bbbe06a673b7757f3bd7e2ab82e83f7dda07bbf88fb43a7e2d59f99085c5b85d15f4dc1597bfbadd1ee20e045c4bc7eaa23e99452caacefbde4abbd41630fd09c2bed83379d981f2918b45eb2c1f8882a76e7e2628697b543e30912c052d9572a2af5ba22c438e74392f327eda9d196bb3f4439b230bc132dfc4f90e0eb3250b617a1d43520963e0a52ce6f09590f113dfb9c8dab9eaed066df715c6ef29e8a862acbfce7c17b173ba829d6a4337adf23937a1b4ce7e118f5c99cbe2504fe06f2a49424ae41d32fbecbffb1a242971", 0xe1}, {&(0x7f0000000700)="9f02c63d4b7f0a63ef7f83fd76f2cc8d15cf40349fba41b211fd8258dd01058e4253aea2db91d9338f7ed986ce4a69027ccb07be8237a385d4de4c1fffb513d20c87f7b8caa1482b927d40ce821d7162ee75167af654092f1f691f1af55c1520167ea1cfbe1389ab934f687752190440f885a318d280851273feb69ca1ef1f2bb048f2303dc9cade1777515539e9e9e77c2bb837c14c647b2bbbbbead8570c1661937872bb02fa5e55d786ea0672129f1b25027adf160e773914c49667781f4461f0112b1be9ab85757a611026c9131e4c6e968ec31d09d0", 0xd8}, {&(0x7f0000000800)="0627d2c2c37812087f5aece8", 0xc}], 0x4, &(0x7f0000000880)=[@mark={{0x14, 0x1, 0x24, 0xfff}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0xfffffff8}}], 0xf0}}, {{&(0x7f0000000980)=@isdn={0x22, 0x4, 0xb3, 0x3, 0x9}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a00)="771cd3876e9eee983f3a0a689ad882035436e16c99b7b106", 0x18}, {&(0x7f0000000a40)="4ddee5c2fcd76d486fcda91679ec363e967579cf32ab0da8c4d3a7bd163fd5e83cda6ae5b652300f68628fba399c92719888fb99138ba4bf505cad25d1230067af79", 0x42}, {&(0x7f0000000ac0)="9a5f90d214f1a5e00bdff2b6efa55d0cb1807448ee4ce82cf8533250d9e40963b2234ed4a8b0ace448d0d076be61ca4c5045c29f2a37f877daca921eac74f171a299e992ce37914474d811e2024d9afd0dbca179c9811d65a45596f4941b1b5b2f5aa3a06642dcf3051a36a57f6627c58c09ba2553d8818609c0dd3b9b80f73adfc6a2db95a7d2c37387", 0x8a}, {&(0x7f0000000b80)="920c44caa89a32e51e12d9c2b8f5fc66047678aab7b0813ae6d6df77dc075fd26503b869c6fc43b2b7e1387c5d6c05555ad49c277ea74a377157b3ccc33bc15741d4417fd4e33b3b5abfe5ba21d6f8d8288bccb503eba9c961ea10c4", 0x5c}, {&(0x7f0000000c00)="160df96490d9ff59d1640b86415b14a83c0dcf775faba474632fbaadc9dcca09f7a4332aca68e2ae4377e01af686d546c01fc4c62ccc76d15d0f6266cdc71246da857858cb297667d9e9a8328760a351fbd0d4c902ede6b1be55e7406a0a085ce88b8c68c2f7d3d37cb5b4bdfcac9a5d467e7956b8f895f985", 0x79}], 0x5, &(0x7f0000000d00)=[@txtime={{0x18, 0x1, 0x3d, 0x81}}], 0x18}}], 0x3, 0x44812) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r3, 0x80084121, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r4, 0x29, 0x39, 0x0, 0x0) mmap$dsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x110, r3, 0x0) 20:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='clear_?\x00fs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:7\b\x9b\xa0.h|\x84\x12\xba\xa2\xf1\xc2D\x92\xee\x1f\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f\x00'/338) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1}, 0x6e) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)=0x0) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000000080)=@abs={0x1}, 0x6e) bind$unix(r7, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f00000002c0)={0x3, 'team_slave_1\x00', {0x80}, 0x3}) r8 = syz_open_procfs(r5, &(0x7f0000000380)='logivu\xa3BL') readv(r8, &(0x7f0000000580), 0x3c1) ioctl$KVM_INTERRUPT(r8, 0x4004ae86, &(0x7f0000000000)=0x3f) r9 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r9, 0x0, 0x1) 20:40:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x06', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1204.542039][ T23] audit: type=1400 audit(1575405635.519:120): avc: denied { map } for pid=23706 comm="syz-executor.0" path="/proc/capi/capi20ncci" dev="proc" ino=4026532285 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_t:s0 tclass=file permissive=1 20:40:35 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000080)=@abs={0x1}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000080)=@abs={0x1}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1}, 0x6e) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000180)=@abs={0x1}, 0x6e) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYRES16=r2, @ANYRES64=0x0, @ANYBLOB="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", @ANYPTR, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB="9d3ce3f3a74689543f5b0e2f8f30c4c60d725052005196ef72af60885436835670bdf98b05d6fd5fa16658f496cc2f418254506a34b19eb095607b2eb7588e738553bbac7954b1db28f99522075ec8096887c06b7dbde93511524f5934df2eea82c89fe42ebdb73a3b9e222075935ea401b6ee09e553aed8d213f3938a2f052c9cbd9be049e1755779f69d79ba27ce01eb08fcd5fa444962914ec408e7d3e23e0d9aadd29667a906bf5b3518711f47dd4572b7010c05eee9dfd4d683b6a3dd7dc756c522cfaeb32212dc4195a04c", @ANYBLOB="7746a7974b5f53a1c29dda4c110be4521a195aa79e327ec508d20e35", @ANYRESOCT=r3, @ANYRESDEC=r4, @ANYRESDEC], @ANYRES32=0x0, @ANYRESHEX=r5, @ANYRESHEX=0x0], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfsF', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:35 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r6 = syz_open_procfs(r5, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r6, r10, 0x0, 0x1) 20:40:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfsJ', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:35 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000000)={@local, 0x26}) [ 1204.893968][T23795] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[23795] 20:40:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\a', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1204.970174][T23795] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[23795] 20:40:36 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) [ 1205.060263][T23795] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[23795] 20:40:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xba', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:36 executing program 2: syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000080)=@abs={0x1}, 0x6e) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000780)={0x0, 0x0, {0x8, 0x23, 0x5, 0x8}}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) openat$cgroup_int(r2, &(0x7f0000000640)='cpu.weight.nice\x00', 0x2, 0x0) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) fcntl$getownex(r7, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r9 = geteuid() getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r11 = socket$unix(0x1, 0x2, 0x0) bind$unix(r11, &(0x7f0000000180)=@abs={0x1}, 0x6e) r12 = socket$unix(0x1, 0x2, 0x0) bind$unix(r12, &(0x7f0000000180)=@abs={0x1}, 0x6e) r13 = socket$unix(0x1, 0x2, 0x0) bind$unix(r13, &(0x7f0000000180)=@abs={0x1}, 0x6e) r14 = socket$unix(0x1, 0x2, 0x0) bind$unix(r14, &(0x7f0000000180)=@abs={0x1}, 0x6e) sendmsg$unix(r2, &(0x7f0000000680)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000000c0)="b4e4380972b73293e7ffcbb8cb85", 0xe}], 0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="000000002c000000000000e00000000001000000a7b6782c119a57a5ace4a20786e3", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r0, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x70, 0xa0}, 0x4840) 20:40:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x5, 0xffffffffffffffff, 0x1d) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'bridge_slave_1\x00', 0x2000}) r4 = socket(0x15, 0x4, 0x7f) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r6, 0xc7f7bead264aeb53}, 0x14}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xe8, r6, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xb978, @empty, 0x80}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffc00}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x10000000}, 0x8100) r7 = socket$tipc(0x1e, 0x0, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f00000005c0)={0x1, 0x20, 0x8}) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r7, 0x8983, &(0x7f0000000380)={0x1, 'erspan0\x00', {}, 0xffff}) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000000600)={0x1, 'eql\x00', 0x3}, 0x18) sendfile(r0, r8, 0x0, 0x1) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x10000, 0xffffecbc}, {0x1f, 0x3}]}, 0x14, 0x1) 20:40:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\b', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000180)={0x1, 0x8000}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) [ 1205.837058][T24084] EXT4-fs (loop2): error: journal path ./file0 is not a block device 20:40:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs(', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1205.928129][T24092] IPVS: Unknown mcast interface: eql 20:40:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/67, &(0x7f0000000400)=0x43) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x420, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000200)) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, @ANYBLOB="79f70300010000080004a8604bd2001653df59559839b86f5407a278224d2c880a8a29053c5fbab7cdbfd869a1c433bd3aa42786b45d07a2eda7f57f1296134b6d7ceddb479fe619f428c4c627589f971b24c48e5df7c85273d27d022c6119407082161e2e13b31903df1358f4952a33d0f740aa04e1d411f3f6f7e91fbc3fa50e3d6bb7f926b7915a76344b81e609fd5bbb5de1860c49d5c79e4f522ae2fa2b7e2b0ebc6a210bad39ca104e4999aa5822d3fbde73a1c093f708ba466bf000a5344ccb302d77d6cfcde68d228b3035aa046941bb001d6e28dac709a89781e615cb27ced276a300bfd0176d763db3d197e160"], &(0x7f0000000380)=0xe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000003c0)={r5, 0xcf, "9a6b1e8072af9e22e8798be7b12e765a65273522b2c5e66aac64a26cb88ae61ba723c3f826adaec77b5a8198cb45c8a7842be2673880a4a396e7cec64cf8d24746be81de5827dd95efe05d9b38cb5bbcb09167df5e7faff399b9799c64c09e80428c4d8bb318ac09c2dfa5235492c1322a39b7c498a5bc7c83bfbbee21b4e4e2397b23173c3f695e7c1165317ee97fdf7a8ba2607b14779c6522de37ad4808f9b3aedadba807f1a0ad1a7b2a8031d40bebfe7aadb4eece8fc1ce814ff15b838bfd3e91512bb7e1700a5ade90539b1a"}, &(0x7f00000004c0)=0xd7) readv(r3, &(0x7f0000000580), 0x3c1) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, &(0x7f0000000240)={0xc, 0x1}) ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000780)={&(0x7f00000006c0), &(0x7f0000000700)=""/98, 0x62}) r6 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000000080)=@abs={0x1}, 0x6e) sendfile(r7, r6, &(0x7f0000000200)=0x201, 0x7ff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x101000, 0x0) 20:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) getpgid(r6) fcntl$getown(r4, 0x9) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) fcntl$getownex(r7, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) getpgid(r8) getpgrp(0x0) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r10, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r11 = syz_open_procfs(r10, &(0x7f0000000240)='mountstats\x00') readv(r11, &(0x7f0000000800)=[{&(0x7f0000000040)=""/46, 0x2e}, {&(0x7f0000000140)=""/240, 0xf0}, {&(0x7f0000000280)=""/37, 0x25}, {&(0x7f00000002c0)=""/64, 0x40}, {&(0x7f0000000300)=""/13, 0xd}, {&(0x7f00000005c0)=""/102, 0x66}, {&(0x7f0000000640)=""/148, 0x94}, {&(0x7f0000000700)=""/252, 0xfc}], 0x8) ioctl$KVM_SET_MP_STATE(r11, 0x4004ae99, &(0x7f0000000000)=0x4) sendfile(r0, r4, 0x0, 0x1) 20:40:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfsd', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1206.599000][T24334] __report_access: 2 callbacks suppressed [ 1206.599013][T24334] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[24334] 20:40:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:37 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1206.713573][T24334] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[24334] [ 1206.725598][T24334] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[24334] [ 1206.783907][T24453] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[24453] 20:40:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x80', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1206.885688][T24453] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[24453] [ 1206.925516][T24455] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[24455] 20:40:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x92', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xe6', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:39 executing program 0: r0 = socket$inet6(0xa, 0x80000, 0xc) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0xad5b16f611f1176d, &(0x7f0000000180)=ANY=[], 0x0) r2 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @netrom}, [@null, @rose, @remote, @netrom, @rose, @null, @netrom]}, &(0x7f0000000200)=0x48, 0x180000) ioctl$SIOCNRDECOBS(r2, 0x89e2) signalfd(r1, &(0x7f0000000000)={0x6}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1}, 0x6e) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r8, @ANYBLOB, @ANYBLOB="0400", @ANYRES32, @ANYBLOB="3cadc590498c0ef80819f9aa8cec", @ANYBLOB="08000400ffd20145549d24178f64563b0b597823eeb7175b751e05ed89b9ebdf98530951019d56b3ddf31e1eae59b3ff67319f9bbfbfb7734e7d6a5a0922dc71df3a0fdda47a25bd47304fac1e4b15b82085b3cff8478e6b31fa87c4e4d1b62c7d9e69dc79cda1f2265ffabbfc5bc6e429f21fda37175c22358449ed535e", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="100001000000000020000700000000"], 0xc, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}) r11 = socket$unix(0x1, 0x2, 0x0) bind$unix(r11, &(0x7f0000000180)=@abs={0x1}, 0x6e) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000001b00)={0x0, 0x0}, &(0x7f0000001b40)=0xc) r13 = socket$unix(0x1, 0x2, 0x0) bind$unix(r13, &(0x7f0000000080)=@abs={0x1}, 0x6e) r14 = socket$unix(0x1, 0x2, 0x0) bind$unix(r14, &(0x7f0000000080)=@abs={0x1}, 0x6e) r15 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001b80)='/selinux/access\x00', 0x2, 0x0) r16 = fcntl$getown(r1, 0x9) r17 = getuid() pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r18, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r19 = dup(r18) write$FUSE_BMAP(r19, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r19, &(0x7f00000000c0)={0x14c}, 0x137) r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r21) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r26) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r19}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r21}, 0x2c, {'group_id', 0x3d, r22}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r24}}, {@fowner_lt={'fowner<', r26}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r27}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) r28 = socket$inet_sctp(0x2, 0x1, 0x84) r29 = syz_open_dev$dri(&(0x7f0000001bc0)='/dev/dri/card#\x00', 0x5, 0x880) r30 = socket$unix(0x1, 0x2, 0x0) bind$unix(r30, &(0x7f0000000080)=@abs={0x1}, 0x6e) r31 = socket$unix(0x1, 0x2, 0x0) bind$unix(r31, &(0x7f0000000080)=@abs={0x1}, 0x6e) r32 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r32, 0x40045431, 0x0) r33 = syz_open_pts(r32, 0x0) ioctl$TIOCSETD(r33, 0x5423, &(0x7f0000000100)=0x19) dup3(r33, r32, 0x0) writev(r32, &(0x7f0000000180)=[{&(0x7f0000000240)="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", 0xefc}, {&(0x7f0000001240)}, {0x0}, {&(0x7f0000002240)="7f2be4bb6b40fc62483e10ca796d04694fe1d84a8cb319ebb5cfcab449a4e8bdb14d87cef8312116eb3cd1f4679539749c225f63380205f3a9208a1c80737eb144c616e582fca682c052257f588a8a604c18370e63d25af4ab6a993414f4f484a5582dd897f1fa", 0x67}, {&(0x7f0000002300)}], 0x5) ioctl$TIOCGSID(r32, 0x5429, &(0x7f0000001d80)=0x0) r35 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(r35, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r36, @ANYBLOB, @ANYBLOB="0400", @ANYRES32, @ANYBLOB="3cadc590498c0ef80819f9aa8cec", @ANYBLOB="08000400ffd20145549d24178f64563b0b597823eeb7175b751e05ed89b9ebdf98530951019d56b3ddf31e1eae59b3ff67319f9bbfbfb7734e7d6a5a0922dc71df3a0fdda47a25bd47304fac1e4b15b82085b3cff8478e6b31fa87c4e4d1b62c7d9e69dc79cda1f2265ffabbfc5bc6e429f21fda37175c22358449ed535e", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="100001000000000020000700000000"], 0xc, 0x0) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r38 = socket$unix(0x1, 0x2, 0x0) bind$unix(r38, &(0x7f0000000080)=@abs={0x1}, 0x6e) r39 = socket$unix(0x1, 0x2, 0x0) bind$unix(r39, &(0x7f0000000080)=@abs={0x1}, 0x6e) r40 = socket$unix(0x1, 0x2, 0x0) bind$unix(r40, &(0x7f0000000180)=@abs={0x1}, 0x6e) r41 = epoll_create(0xffff) sendmmsg$unix(r4, &(0x7f0000001f00)=[{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000140)="e3ff0fc662b5b94d7097693486fa8b459936b755dc6ca897fbb27f61df268b97d503fa5339ffa5077df9bb9c6eb5cd8cb7a6e9fa8a87010a7e6f7b9fb35688b874c1be3bc0fa63efdbe857629a4740528382e5ebf48582e4bfcb5a49c89c2119ae2a97f1760384faa2bb1f4ef832eb3cfeaf1d7f8a2f12fbde3099ddb4a3d9f9d098afdd85c47637ef1e836aeb0122ef7632e174eee9dfc94d3e93898e463471b67c0d154de8ae19aeb7258a44eca020795716e5f33c58ddb3aca3bbc559dd59df5d081b0e3e9eea9fd78e74096214058a9a117510d1ffc54422ee517985cc9a32", 0xe1}, {&(0x7f0000000240)="9447a66f91aeddf9640da09aa919cb350b217c6b62", 0x15}, {&(0x7f0000000280)="757017bbaf82971cb5b9dd5bf30f0b8af2e7c51939d953b9bc4dc1654fbcb9507b0b70d47e9468dad03ed0a5eb40010c1d669a08dcb7e5f9445ab4b19b7af7b87d7e1ca2576fe73028ec9d8535ad39d8ca16ac11ccb14b6b9dd0a8b9226452a13cc539dd719f8d634ab6840f4f98a5300ad9b33dc3d7c0db90fd94fd0e0e25905f6d3824ff191c66ddb325aa", 0x8c}], 0x3, &(0x7f0000000380)=[@rights={{0x18, 0x1, 0x1, [r3, r2]}}], 0x18, 0x44020}, {&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000005c0)="e8834941ab876927722da32c4c89a9ccfce1079c339f2207f4ba3444e9d2146a481a28bf1bfbf4", 0x27}, {&(0x7f0000000600)="3e769978c3446e54f421559135d1dad762bade29135aecc5a06cf68d1a2b2d37ba1320d8891a29a84bcec7a02bb15e6be67d5bbe3fe9363f9c673f427a7927adff0680e5cd04c95b1f6127b38d0298c9167112e6135a6fe5b025b830ec4d86b441536df0959a7ab73fc63ed03ab89ef89010dc77ae21571d19508c99d89bc70bd31429f56ad0f24d7fc1cef9855696718940be2bfada360412f7c9aa9445", 0x9e}, {&(0x7f00000006c0)="cae813a7eedebda41a3c514ff63bc6b2dadccb48845dbf7135f8cf503eafabdf17c5a27328270c43d92f9d3f3eac8b3c8dd9d35397a425d23a8276b59078a408f915538d493ae3617adb883c0c016bfe3bdb290e6e4233d0251f9d8b2329e33167255ec0fd4a11686653a5893b698355ba83aec6acf28703ab47e0d62272fb50b9d1c31c4fb3c9794d0fb15274088716171c3ce6c8b91347225c3baa8dc664f5818ed1ce10e8fb83bf5590bcff46c2df623e957914aa38eccd3f21179ba33272303c47f135d7db486ac045a55c644163c3eb89a54e77d5ab4fd1c8c3227db7316a639534fbe2bc6dd509dd14e40b9c", 0xef}], 0x3, 0x0, 0x0, 0x3da017a90b671456}, {&(0x7f0000000800)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000880)="ee81271262d0505fb2193c948b63f35153151b65a34c9364264869182d17e1d6889a0b15778d1c7fa528ed29ac365bdc7e5fa719f2ea4f144db463502ca234e16012d622c89da321167b30406fe4a513157b3b4a4b1a898ec36523de048fd53ddb160ce37fbfc2e8e6c802e88158e6bcddf530fbc9cbc5379718cff1dc72eb2b69a56d3e2cbcf324bcebeb05d2", 0x8d}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="f82525570d77b6f4d035d1766ce0d01f03286fc31aa1a6160585e9856420832eab41da5d1b42b8e64bf94a8fd45573f12ec5d46b0eb88391af609bc8076ebd14784021f92cdaad2987dd2ba0a84b182f763a8b966035ea5bb4956e1d8327b5922437016fe0c80ec09a53d122798f9585381a2558ce74c88774569a303524adfe2a4a11f97a8c021f7808628818063ea192709306da4bc6a3ce8b96913bada228799a545ce7b950a6f526c0a2e9eb203f92426b2fd6bfb81a8ddda1f5353667fc4def71266cfa3011feeca7acc9cb5c", 0xcf}], 0x3, &(0x7f0000001c00)=[@cred={{0x1c, 0x1, 0x2, {r6, r8, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r10, r12, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r13, r14, r15, r0]}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r22}}}, @rights={{0x20, 0x1, 0x1, [r28, r29, r30, r31]}}], 0xa8, 0x1}, {&(0x7f0000001cc0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001d40), 0x0, &(0x7f0000001e80)=[@cred={{0x1c, 0x1, 0x2, {r34, r36, r37}}}, @rights={{0x24, 0x1, 0x1, [r2, r38, r39, r40, r41]}}], 0x48, 0x4002000}], 0x4, 0x40001) r42 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r42, 0x0, 0x1) 20:40:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x80', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:39 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1208.431929][T25004] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[25004] 20:40:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x400, 0x0) pread64(r2, &(0x7f00000004c0)=""/132, 0x84, 0xcfb7) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200000, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r4) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) sendto$inet(r7, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x7bc15eeef7e96a7d, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000003c0)={r8, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={r8, @in6={{0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}, 0x1, 0xcacf}, 0x90) 20:40:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x98', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:39 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) sendmsg$nl_generic(r7, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f0000000740)={0x9c, 0x1c, 0x20, 0x70bd2c, 0x25dfdbfb, {0x17}, [@nested={0x80, 0x88, [@typed={0x8, 0x5f, @fd}, @generic="8020e8ff6e8eb5ec0f485e6225d9e1c024a76eb6cd021079c14773bc6dbe03b8db5e7408fbcf3fdbefc9780e4b52c1d99ea8e1d419638d2a5354ea97c94fe0b4a02db99bc752d0c84456735043f633145b75e5011fc63d135cb038fafc33c2cef962509c6e5fc51aa74a12f2441250500e"]}, @typed={0x8, 0x20, @uid=r9}]}, 0x9c}, 0x1, 0x0, 0x0, 0x44840}, 0x5481c22823829105) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x3, 0x7fffffff}, &(0x7f0000000040)=0x10) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x34800, 0x0) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000140)={r10, 0x9, 0x8}, 0x8) r12 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r1, r12, 0x0, 0x1) 20:40:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000200)=@srh={0xf, 0xa, 0x4, 0x5, 0x8e, 0x50, 0x1, [@loopback, @empty, @local, @local, @dev={0xfe, 0x80, [], 0x80}]}, 0x58) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000080)=@abs={0x1}, 0x6e) fcntl$getownex(r5, 0x10, &(0x7f0000000040)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r7 = syz_open_procfs(r6, &(0x7f0000000000)='net/netstat\x00') sendfile(r0, r7, 0x0, 0x1) 20:40:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0xa, 0xfd) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:40 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xe4, r2, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3d9f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3a4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x741}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @ipv4={[], [], @rand_addr=0x10001}}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3d}]}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x2000090}, 0x48010) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x800, 0x0) r4 = memfd_create(&(0x7f00000002c0)='!\x06security\x00', 0x2) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x20) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) r4 = pkey_alloc(0x0, 0x0) pkey_free(r4) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r5, 0x0, 0x1) 20:40:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "dae9519e0aab4af3", "04522161fa2296bed91f86d5df5bfa566f33eb207107759f86dadfe61d6adf88", "57c91a89", "faf166966cf10c6f"}, 0x38) 20:40:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = accept$unix(r1, &(0x7f0000000000), &(0x7f0000000140)=0x6e) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) [ 1209.870437][T25213] XFS (loop5): Mounting V4 Filesystem 20:40:40 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@abs={0x1}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1}, 0x6e) r2 = dup3(r0, r1, 0x80000) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) sysfs$3(0x3) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r6) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) sendto$inet(r9, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x7a, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f00000003c0)={r10, @in={{0x2, 0x4e20, @remote}}, 0x100, 0x610f, 0x201, 0x10000, 0x62}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x8b37, 0x7fff, 0x200, 0x6, 0x2, 0x1, 0x5, 0x8, r10}, 0x20) r11 = socket$unix(0x1, 0x2, 0x0) bind$unix(r11, &(0x7f0000000080)=@abs={0x1}, 0x6e) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYRESDEC=r11], 0x1) setsockopt$inet6_buf(r4, 0x29, 0x39, 0x0, 0x0) 20:40:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r8, r9, 0x0, 0x1000000000e6) r10 = syz_open_procfs(r7, &(0x7f0000000180)='oomtscore\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x1c\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r11 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1210.329531][T25213] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1210.368364][T25213] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1210.408672][T25213] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1210.467606][T25451] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[25451] [ 1210.491026][T25213] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1210.529362][T25213] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1210.538637][T25213] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 1210.551460][T25451] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[25451] [ 1210.752892][T25627] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[25627] 20:40:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs$', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:42 executing program 0: exit(0x800) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001740)='/dev/full\x00', 0x200, 0x0) setsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000001780)=0x1, 0x4) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:42 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, 0x0) r7 = syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000100)=0x19) dup3(r7, r6, 0x0) writev(r6, &(0x7f0000000180)=[{&(0x7f0000000240)="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", 0xefc}, {&(0x7f0000001240)}, {0x0}, {&(0x7f0000002240)="7f2be4bb6b40fc62483e10ca796d04694fe1d84a8cb319ebb5cfcab449a4e8bdb14d87cef8312116eb3cd1f4679539749c225f63380205f3a9208a1c80737eb144c616e582fca682c052257f588a8a604c18370e63d25af4ab6a993414f4f484a5582dd897f1fa", 0x67}, {&(0x7f0000002300)}], 0x5) ioctl$TIOCGICOUNT(r6, 0x545d, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r9, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r10 = inotify_init1(0x80400) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r11, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r12 = inotify_init1(0x0) fcntl$setown(r12, 0x8, 0xffffffffffffffff) fcntl$getownex(r12, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r13, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r14 = clone3(&(0x7f0000000300)={0x40804000, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180), 0x3c, 0x0, &(0x7f00000001c0)=""/186, 0xba, &(0x7f0000001140)=""/67, &(0x7f00000002c0)=[0xffffffffffffffff, r9, r11, 0x0, r13, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0xa}, 0x50) r15 = syz_open_procfs(r14, &(0x7f0000000380)='loginuid\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup3(r16, r17, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) r19 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r15, r19, 0x0, 0x1) 20:40:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1211.244658][T25679] IPVS: ftp: loaded support on port[0] = 21 20:40:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfsD', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1211.667962][T25689] __report_access: 6 callbacks suppressed [ 1211.667977][T25689] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[25689] 20:40:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xd2', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1211.709267][T20346] tipc: TX() has been purged, node left! 20:40:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xd4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1211.830643][T25679] ptrace attach of "/root/syz-executor.2"[9757] was attempted by "/root/syz-executor.2"[25679] [ 1211.995625][T25689] IPVS: ftp: loaded support on port[0] = 21 20:40:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, r1, 0x0, 0x2c, &(0x7f0000000480)='cgroupvboxnet1-!nodevcpusetposix_acl_access\x00', r3}, 0x30) r4 = socket$inet6(0xa, 0x80003, 0x6b) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000200)={0x2, 0x0, 0x8001, 0x9, 0x3ff}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000080)=@abs={0x1}, 0x6e) r3 = accept(r2, &(0x7f0000000200)=@rc, &(0x7f0000000280)=0x80) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0)=0x0, &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r6, @ANYBLOB, @ANYBLOB="0400", @ANYRES32, @ANYBLOB="3cadc590498c0ef80819f9aa8cec", @ANYBLOB="08000400ffd20145549d24178f64563b0b597823eeb7175b751e05ed89b9ebdf98530951019d56b3ddf31e1eae59b3ff67319f9bbfbfb7734e7d6a5a0922dc71df3a0fdda47a25bd47304fac1e4b15b82085b3cff8478e6b31fa87c4e4d1b62c7d9e69dc79cda1f2265ffabbfc5bc6e429f21fda37175c22358449ed535e", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="100001000000000020000700000000"], 0xc, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) r8 = socket$unix(0x1, 0x2, 0x0) bind$unix(r8, &(0x7f0000000080)=@abs={0x1}, 0x6e) r9 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r11, @ANYBLOB="020002004dcb2f2a0321f6f8e53c03ffc521dedc43e8aeaf516def3e41430e7a", @ANYRES32=0x0, @ANYBLOB="040003000000000008000c00", @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="100001000000000020000700"], 0xa, 0x0) r12 = socket$unix(0x1, 0x2, 0x0) bind$unix(r12, &(0x7f0000000080)=@abs={0x1}, 0x6e) r13 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0) sendmsg$netlink(r3, &(0x7f0000002680)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x2}, 0xc, &(0x7f0000002600)=[{&(0x7f0000001f40)=ANY=[@ANYBLOB="140000002c0000082bbd7000fddbdf2504001c5858e34f60000000000000000000"], 0x1}, {&(0x7f0000002e80)={0x1070, 0x3d, 0x200, 0x70bd2b, 0x25dfdbff, "", [@nested={0x1060, 0x2f, [@typed={0x8, 0x26, @uid=0xee00}, @generic="6180bfe5584da21939a9d8596969521707b0b3c97ef6c295360571e7fe11a6958002b451226745306a5279be52973ec244c2a313c0bed8c59d0819c4daad4c230fbeacc464a6e771649a9b1a20b487b131", @generic="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"]}]}, 0x1070}, {&(0x7f0000000380)={0x58, 0x32, 0x20, 0x70bd26, 0x25dfdbfd, "", [@generic="db16be46c35e4cad000ed5ffb1f7f0a53b25365d74373f6634dad0fbae83ff4f6d89468c046a7ac1907b984376fb3521f00ad741a60b3e", @typed={0x8, 0x10, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x8, 0x35, @uid=r6}]}, 0x58}, {&(0x7f0000000640)={0x4f4, 0x31, 0x410, 0x70bd26, 0x25dfdbfd, "", [@nested={0x430, 0x11, [@generic="f841072fdb309d3ea4cfad01a2bee9510b036560cbd4ae259bcff75750848a2c810b04f1dca35c7f4d017b05e501291febfcf4ed11b78ee58e89c1cd80e99fb42e15d7506e4cc2f6c429b97dcfc7b4bd4e8b25438de8a7fe88c59fa7586d083466c7cd7c4445684ded04b7179e2ad711b5c6ba4619f628d15cff2abc055a2d3451038fffd9dc7ae31188ea37a319ad8bebdd1b7dd95d4b30d59b14d03bef1244473b257849955b447b9c3999267d12e885e0f2ec713f5e82b63380d35e22fa18049d213a80c3d7425c33786523ea24a27cf22ac5a67786a1a3ba578869753f21a5c06e4dbcdf3deca6982493", @typed={0x8, 0x90, @uid=r10}, @generic="47afa54f74602eeb714b0ae3803af26dfeb209392ce39d166b08e65320c3e7cdb07f717159076ef15566882db13df6ba7df72d7dbbe3f609f930331dfc7958acb830fbff89648c5c7d1318d629a42d29af760dc47d5005c7507396ed68d335964fe48705357963164ac9c85f690c35a8fea6911f775f421a7757a7", @generic="f7cffa848c0c46db349ae418d6d720cffd8fec0f405c3286d567b4f9f9f57c2fa291f30e29beab92fb2e3869a3ce7ae843d7c03ef047e23d870aeefd5012fe869b792638dc9468816d7e3f216964d3397dbb23678258075b441ce43c2ef6d6124259de61fc26e8f54444fd236de0b51ad6da7f46fad5041b480949ebd9cf7413456d5bd403115888c496c7549819884a34e4a8716ef764f9ecb816b0f08ee055", @typed={0x8, 0x77, @pid=r7}, @generic="455ebb621c859acf14bcdb095c810f26be55977662020c8935bd98061c1af0cfa102a0bd3282b0024282d39e8cb176910df72ca4332c0ca2e398f1a27156407dc876159e768505dc2dff4e2a1b4cf86a460b54fa041539a172d4e085b52c31d82987f6cf65bdae59bf5c6df9df11609cacb82246bbeb41585b0fc3d6de7cfa1e2071c5514bcc03ade27f18abf97b490455873342b9", @generic="5391c462b3a61d4827c4581891352f38a87729c2b08d595fd41bbd19a8dae79b2c90827aaab1d3d260c2d781b9108ab5ebaaba360c1a4b566d8293803513f0af7f07825216f9de69b7823994f79b3e7db5b80694680f69970ef29774c8d13c88d4894d453a062f72060fb0d34aa5664aa43f943e015d80bd03921a9b9f092c33f4a8de83cc87dbc1b54fde", @typed={0x8, 0x4e, @u32=0x2}, @generic="0d833d6c751d01f48b0dcb704f8dfd15dd7fc4f613da53630963fc79c532d22fff434fb47bbf59242dcce6fe430163773e72f77d6ee559a3d0df0e1ab88e553da0cdf909ebd808366a32762f1728ed204e10af8f21d7a84096c80b57df1168ea3925bb5702abac8810382258bd637cac2fc92e5957bb85d71dd1a98fdab72d409a30386133be25b8b785f43762c013ce14b395d87c798e3bba40263cac010bc965a5fca1536275299b01184aa156456bd3a67fbcaf69d5b7e316ba97675ca8d8ec9d673119f9a11c3b5e9bc453867c4a208d4ada1496673585732e2f4a746f2a7d9189647b40c9eb3a69431c"]}, @generic, @generic="efdc554b72890ae8f7b1f3c1c93042535a4d746900f2f1dd9c6392c798475c0aefc14b4c99975ad9e1415443ca041c25453ef90e0a908d911cc9ea84907b352e8a4df6240156fbeea1750306a4a3f2aaecfaffe95991f5fad24fa90c2d5adbd5f7e4edc1241f19c4823cbc31056f99e3081e4cd4a7887e88b0abc0332fabfab32c841bc3046ed1a733df67fbca90665dd3fddb67033f2310ffeee7baf31b93b1979754d40f793614d09fd6", @typed={0x8, 0x54, @fd}]}, 0x4f4}, {&(0x7f0000000b40)={0x1dc, 0x42, 0x8, 0x70bd27, 0x25dfdbfb, "", [@typed={0xc, 0x33, @u64=0x6}, @generic="a13a63c96832754026e9b02f240202ab3646ab36a1141a67eb832147848f73130c9a6fa1fdff61ce", @typed={0x8, 0x2b, @uid=r11}, @generic="36d6bc69b70c78f38965a56d9f1b9c2194a244f5f0bd53a8482d2486a79ee80a985b26a2beb6119cab283126f61d783959b8fb1129b8da503524972e598bd78906db246943db2b469e78383ec4c70d22e6e9a068337abe39fc9888794f96856979fddf81e47ea6d687c1d865277f8d54d9c79a2ac71c267cad449eb14e4d556d60", @nested={0x10c, 0x22, [@generic="2986c528c7ae7dc12fc746c45fc0add8181f1a1def9b32c4b7acf6d60873abfbbff2c6f8ed3ac5cc716343dbe55e27cdda186bc32697900dcfbb3129df07568f7a284fd2234eb637f6b6edf9a1e4ac047ce12ad76cd0040d759beca8d8f576909087853a9125e5b87edf40ee5dad6937858527d6594f1867dbe1600610adea1193bc957280bd3d88c31417b080813582d1a707d17340642d7d26dab78902e868d445029e424848bd00099538e37591ac41e44995505d9b41e5382dd68af023bb1add", @typed={0x8, 0x3e, @uid=r14}, @typed={0x28, 0x1, @str='mime_typetrusted-wlan1nodev:@em0\x00'}, @typed={0x14, 0x51, @ipv6=@mcast2}]}]}, 0x1dc}, {&(0x7f0000001dc0)={0x98, 0x34, 0x100, 0x70bd27, 0x25dfdbfb, "", [@nested={0x88, 0x64, [@generic="58cbd5f1a5c8ca862538672d2fd7db2daf8dfb268824a5320c52cfe6c4f64cc4c6eae4507f8837010f6c1dcd8bab065ca4035c8d4222c27d60a9ce770107a39544add000a0a2e5266982c8f6333eba8a166f127108b6e47dc57225c7865ca55fb87b9b221d48763a91e233de4c8d1fa3cdd20c55e782fb85f598b1f81e8a2b21bc41"]}]}, 0x98}, {&(0x7f0000003f00)=ANY=[@ANYBLOB="44070000120000042cbd7000fbdbdf2524005c00f7930698b2c6b15e9a1997c78d4317d95b841ec84461a6ba7f7ddee37400000008005a00", @ANYRES32=0x0, @ANYBLOB="080129008d61db1b5802513ec02c0091aa0f37da0c02534428746b9b857dbc9f020c5597e84b0bbd016eb0607e6ab0eec348c088524bc21d33f11331f4428da7fa60b4e2225140f82fdf49305596e47f7fc7cd9d9bb6eafd298aea76f03f43324c8d7abde087b910006a0014bce9886d224eca320c000008008400", @ANYRESOCT=r12, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="6c001b00a553f249eed42cd8f1aa30895be4c9c74dccf82b33f3ca7d2d6f49b37d235c562f19cc8f10c052e45588086d71c1075f7b83b4109c8591dc1fece3e690f495031ce144ee983d5d53cbfac480c0ce9829c7c3f372d0f50f1421a415814f021406025b70af1b970100"], 0x7}], 0x7, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [r9]}}], 0x18, 0x8000}, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup3(r15, r16, 0x0) r18 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98Sr19}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r20) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r21, 0xc08c5336, &(0x7f0000000140)={0x3b64cfdf, 0x2, 0x8, 'queue0\x00', 0xfffffe36}) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r22 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r1, r22, 0x0, 0x1) 20:40:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1213.013360][T26157] XFS (loop5): Mounting V4 Filesystem [ 1213.077445][T26157] XFS (loop5): totally zeroed log 20:40:44 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1213.149373][T26157] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1213.238629][T26157] XFS (loop5): Unmount and run xfs_repair [ 1213.265342][T26157] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1213.283636][T26157] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400000, 0x0) [ 1213.319430][T26157] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1213.378698][T26157] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1213.399303][T26157] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1213.429044][T26157] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1213.461948][T26157] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1213.517882][T26157] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1213.549404][T26157] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1213.558320][T26157] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 20:40:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x11c200, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="020002004dcb2f2a0321f6f8e53c03ffc521dedc43e8aeaf516def3e41430e7a", @ANYRES32=0x0, @ANYBLOB="040003000000000008000c00", @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="d2832c9a50c2a0ce49331a6206393f858090a3866ac79cbf22d5933f1e40ded56f4ecbf77ec1929bdcd6d532d0e5640fa34ec456a4db634b6682575ea4ade5a772c6f7fab1db59090000c06535495d99b5fbcbeafd0a1d1b7f99301bb104a5cfc27b613f99cd3840cd7d430a004ff8cd1e3207451def9ac4be72a65d1bd65b34aa3b"], 0xa, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@local, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e23, 0x7, 0x4e24, 0x7, 0x2, 0xe0, 0x80, 0x1d, 0x0, r2}, {0x4, 0x8, 0x3, 0x0, 0xd1, 0x4, 0x10001, 0x80000001}, {0x3, 0xffffffff, 0x7, 0x7fffffff}, 0xff, 0x6e6bbe, 0x0, 0x2, 0x3}, {{@in6=@mcast1, 0x4d5, 0x5f}, 0x2, @in=@local, 0x3500, 0x0, 0x950370b4fe767fac, 0x1, 0x7fffffff, 0x2}}, 0xe8) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r3, 0x29, 0x39, 0x0, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1}, 0x6e) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000000180)=@abs={0x1}, 0x6e) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r11, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3d50af24da4322518e0da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a060000008eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r12 = dup(r11) write$FUSE_BMAP(r12, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r12, &(0x7f00000000c0)={0x14c}, 0x137) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r17) r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r19) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r12}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r14}, 0x2c, {'group_id', 0x3d, r15}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r17}}, {@fowner_lt={'fowner<', r19}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r20}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r21, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r22 = dup(r21) write$FUSE_BMAP(r22, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r22, &(0x7f00000000c0)={0x14c}, 0x137) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r27) r28 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r29) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r22}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r24}, 0x2c, {'group_id', 0x3d, r25}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r27}}, {@fowner_lt={'fowner<', r29}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r30}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r31, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r32 = dup(r31) write$FUSE_BMAP(r32, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r32, &(0x7f00000000c0)={0x14c}, 0x137) r33 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r34) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r36 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r37) r38 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r39) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r34}, 0x2c, {'group_id', 0x3d, r35}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r37}}, {@fowner_lt={'fowner<', r39}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r40}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r41, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r42 = dup(r41) write$FUSE_BMAP(r42, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r42, &(0x7f00000000c0)={0x14c}, 0x137) r43 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r43, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r44) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r46 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r46, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r47) r48 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r48, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r49) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r42}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r44}, 0x2c, {'group_id', 0x3d, r45}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r47}}, {@fowner_lt={'fowner<', r49}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r50}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) getgroups(0x8, &(0x7f00000006c0)=[r15, 0xffffffffffffffff, r25, 0x0, r35, r45, 0xee01, 0xee01]) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r52, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r53 = dup(r52) write$FUSE_BMAP(r53, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r53, &(0x7f00000000c0)={0x14c}, 0x137) r54 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r54, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r55) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r57 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r57, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r58) r59 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r59, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r60) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r53}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r55}, 0x2c, {'group_id', 0x3d, r56}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r58}}, {@fowner_lt={'fowner<', r60}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r61}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) r62 = getegid() fsetxattr$system_posix_acl(r4, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0xb}, [{0x2, 0x6, r2}, {0x2, 0x1, r6}], {0x4, 0x4}, [{0x8, 0x4, r8}, {0x8, 0x7, r9}, {0x8, 0x2, r10}, {0x8, 0x2, r51}, {0x8, 0x6, r56}, {0x8, 0x4, 0xee00}, {0x8, 0x7, r62}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x1) 20:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x6a8842) ioctl$SIOCGETLINKNAME(r5, 0x89e0, &(0x7f00000001c0)={0x4, 0x1}) read$snddsp(r5, &(0x7f0000000140)=""/95, 0x5f) sendfile(r0, r4, 0x0, 0x1) 20:40:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:44 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1213.745727][T26157] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1213.817204][T26157] XFS (loop5): Failed to read root inode 0xd88, error 117 20:40:44 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_proto_private(r0, 0x89e6, &(0x7f0000000380)="4b112332e0f30b47333c10d8ffa96805f559d07654c6dd406345dc5826ece69ed1ab7239717da1b237ec5cdbaaafec46271e65d097c71ecbdfb4b3486edc590c80d554305a143ce01c21d600825b296fa58d3c0607b327f010721ef9a1fc4bd6825e825b668ccc3afbbe814c5f0d50426004b625b85836c78a7fd3b090a4946cfaaffea1d5050ea8e33c3f0958b7e039e90c1bb8bb1a8876222c1e43903e19cc8941f2b6b25da3b0dac4b1d6211d7858f9be5c63fda3dc0d96db535fbaa2") r1 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r1, r6, 0x0, 0x1) socket$kcm(0x29, 0x2, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$unix(r7, &(0x7f0000000080)=@abs={0x1}, 0x6e) preadv(r7, &(0x7f0000000200)=[{&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000040)=""/54, 0x36}, {&(0x7f0000000140)=""/5, 0x5}, {&(0x7f0000000180)=""/83, 0x53}], 0x4, 0x1) 20:40:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000200)=0xfff, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000180)=@abs={0x1}, 0x6e) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000080)=@abs={0x1}, 0x6e) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYRES64=r1, @ANYRES16=r4, @ANYRES64=r5, @ANYRES16=r1, @ANYRES16=0x0, @ANYBLOB="f2b8f22559bddc051b8c2fcc30d48f35df9d18750435195de44e2fcdaffad1db5243ae50d0371724325c00989fd8b08e598f4652801a745921b64cada840bab3f5a6e1c48b16d6c6e70eb97de452a8329136b0d9538ae34280beda83e4aea42d19fd1aa34b28112df87456851b1e7379fb20026ce11a25b71f6725f24b28c634970efc88f1e209ea023201ab5b642e48b55e4297189bab4755575fd6bf7900860533e3f5099168808c0c6be4400740905369ff407713ede1aad7d7c6ac4671ca6aded749c4d3a19fb56d7f7327c98783fa45e934ec1f53b07949f6eb3bdf"], 0x7) prctl$PR_GET_DUMPABLE(0x3) setsockopt$inet6_buf(r2, 0x29, 0x39, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x06\x00\x00\x00\x00\x00\x00\x00\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f\x05\x98\x02)\xe0\x93\xaa\x11T\x05\xb6h?!ym@\x0e\xa4\xe7\xf2X\x165\x81\x1aa\xe1\xe0\xaa\xf0\x9c\x9a\x8e\x19\n\xf4\x15\xc52\xd2\xcc\xd4\xa9\xbe\xd5\xec\xcbG\xf3\xce\xf2\r\xd2Z\xae\xf5k,C\xc7Q\a\xa8M&\xf4\xd8\x9d\x88\xf2\xde\xb6\x13\xe4\x1b\x05\x9a\x87I\xce\xf3\xe1(\xb5\vS.\xf4\x8d\x03\xbbF\xf8\xa3\xb1\x9e\xdd\xfd\x03I\x9f\x9c\x11?[\xc3\xe2\x8e\xc6\xe9\x1a\x9d\xe0\xfd\xc4\xd3z\x1bF\x19\n5\x18\x1d\xf7d\xe5\xc2Hv\x84\x03\xed\xa6\"\x9a\x9c\xd6\x9fQ\xe8\x8d\xc6\x96\xc4\xeei9\x01\x01\x00\x00\x00\x00\x00\x00\x8f') pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/4096, 0x1000, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xc6, 0x200001) unlinkat(r3, &(0x7f0000000140)='./file0\x00', 0x200) r4 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r5, 0x0, 0x1) 20:40:45 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:45 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x40, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000080)=@abs={0x1}, 0x6e) sendmsg$nl_generic(r2, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xc00002}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1ec, 0x29, 0x10, 0x70bd2b, 0x25dfdbfc, {0x1d}, [@generic="2f748677", @nested={0x10c, 0x7a, [@generic="318ce60926690355bcb034df2a51116e804c481a124698385e24ed238397ef0d651b20524b34fb956b97d1341bb4dcf1f8f2f252d4f846327e9fe3f2e3a11cc9a2cffd12b6b3aac45a5c7f4fa717a404555fb00ee5ebe63c7a48f401bb6f7d0050367015ac1d18f27cd203c6f33693d9f9f319f1200249a5673a9cb6219462", @generic="634c2aae9a9aa14320b68674487fdf25bde453839a1f6cac40ffbf87ed6b2bf24b063414aec32ac8ae30d03ad0a76b8da61a6b0303f54e20f1ea45b8111aaac2014f540c8aa8d39509bed8de93e5b138d799c8821f0c2ee4c02ddf811bac47e0cbabe941aba8d25eedbd995dade65a71c75149b912bbf843cd8bf56af0d31c04acc13e46a2fc7cc2"]}, @generic="6bf2a8ad8235e600a04f9d9ff5da6440aaab841ac6fd3ed0401028605a463e58e76749747b0fe20eb4380a3458fb1f125f13f90ebd515966ebfdf5b3da21baa2b1339fe005a5e65ec2e3ac9aba7025e87b6ef21ada7e7f6773ab8b7975527042fc30534b38dfe1eb90a9bf2eeaba6decbadcebc593ba5e4392cf680d552deabc1393b4c00333131b0a57a96525c9362b64a225c587a4772827c504b8b23426982fadbb380f707b3c73204cf98887c6902bb2ba", @typed={0x4, 0x47}, @typed={0x8, 0x5, @fd=r3}, @typed={0x8, 0x91, @u32}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6) [ 1214.628657][T26630] XFS (loop5): Mounting V4 Filesystem [ 1214.655611][T26630] XFS (loop5): totally zeroed log [ 1214.661595][T26630] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1214.672325][T26630] XFS (loop5): Unmount and run xfs_repair [ 1214.678289][T26630] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1214.686331][T26630] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1214.695734][T26630] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1214.705257][T26630] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1214.716916][T26630] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1214.726126][T26630] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1214.735673][T26630] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1214.746013][T26630] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1214.769597][T26630] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:45 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:45 executing program 0: r0 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000180)=0x60, 0x80800) write(r0, &(0x7f0000000280)="f250bbd2b08455dc8d53578f93672825ccb13660554b5a4ee41f939b37bd8c4ce7d3a7d8b3bf179dcaaefb64de2dea510cb3d55287da35c4b749ff75b6c81f92c6e861477d613ff226366afedf8971c186619d116b9c145caa79f49103c2f41ca93181e1d60f4022f5f709191588a47065a626f8f770da47bbace4701cf1fbb786f016721000703e08cde5f9f1369d116ccbc811ab0c23712c2e969ee36dfa36e0dc79f8d6005d62d886991305623145957aa42de6aeaa4c101531b7c0daef8e4469360b71cdcea899ecb0cb8dd0c45a7f4bba564e22547f91b7af2c0af7f00dd8fbc5003d6202d6aafaf67aea2f70757ef6e5c1738b8f4d5c", 0xf9) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:45 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:46 executing program 0: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x400, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f0000000200)="0931afcc1d45fd9bc8bb2cd81742ead37fd5631ec83e72c2be9f130ff44c12c0a63dbee6155f02eadb8f2f33a6c2f8f58db32586d76be1ab9477bdfba7c00788ca1eead3856ff4abd8b2cedd378adaf10285bd81731027a3089b43e9863ca707cca0185fb6013b16", 0x68) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x10000, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000180)=@abs={0x1}, 0x6e) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x0) r3 = socket$inet6(0xa, 0x800, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="ad3e1394cf17373ad8f8969c14d42c5db74723c7b85f2854c7eb09f3ad7f6c5dd0443aa9364db3b8a45b4687f3e09a155b1c45b5d0b5e9e0a88bcf2b19b33103c0ee320d031198de26c35c5fa04f82f0c67684d55d630d365859"], 0x1) setsockopt$inet6_buf(r3, 0x29, 0x39, 0x0, 0x0) 20:40:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:46 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:46 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1215.773685][T26975] XFS (loop5): Mounting V4 Filesystem [ 1215.812086][T26975] XFS (loop5): totally zeroed log [ 1215.818031][T26975] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1215.876708][T26975] XFS (loop5): Unmount and run xfs_repair [ 1215.896258][T26975] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1215.909563][T26975] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1215.977099][T26975] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1216.022226][T26975] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1216.042540][T26975] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x1) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000080)=@abs={0x1}, 0x6e) syncfs(r3) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x9, 0x8000) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1216.088659][T26975] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:47 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1216.163655][T26975] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1216.248187][T26975] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000180)=@abs={0x1}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1}, 0x6e) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(r5, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000050c0)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r6, @ANYRES16=0x0, @ANYBLOB="0400", @ANYBLOB="de2c6c2586ad9d958b386ed42d4614b149f56852a3478460e4435008b6201a7756a95ccaede8d4ccbb8af209188807e9ec2559330e7cf62633098b13df4356c9834350a7fddb743c9288e4aa4f", @ANYBLOB="3cadc590498c0ef80819f9aa8cec", @ANYBLOB="08000400ffd20145549d24178f64563b0b597823eeb7175b751e05ed89b9ebdf98530951019d56b3ddf31e1eae59b3ff67319f9bbfbfb7734e7d6a5a0922dc71df3a0fdda47a25bd47304fac1e4b15b82085b3cff8478e6b31fa87c4e4d1b62c7d9e69dc79cda1f2265ffabbfc5bc6e429f21fda37175c22358449ed535e", @ANYRES32, @ANYRES64, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="100001000000000020000700000000"], 0xc, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000000180)=@abs={0x1}, 0x6e) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/vhost-net\x00', 0x2, 0x0) r9 = socket$unix(0x1, 0x2, 0x0) bind$unix(r9, &(0x7f0000000180)=@abs={0x1}, 0x6e) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r10, @ANYBLOB, @ANYBLOB="0400", @ANYRES32, @ANYBLOB="3cadc590498c0ef80819f9aa8cec", @ANYBLOB="08000400ffd20145549d24178f64563b0b597823eeb7175b751e05ed89b9ebdf98530951019d56b3ddf31e1eae59b3ff67319f9bbfbfb7734e7d6a5a0922dc71df3a0fdda47a25bd47304fac1e4b15b82085b3cff8478e6b31fa87c4e4d1b62c7d9e69dc79cda1f2265ffabbfc5bc6e429f21fda37175c22358449ed535e", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="100001000000000020000700000000"], 0xc, 0x0) r11 = socket$unix(0x1, 0x2, 0x0) bind$unix(r11, &(0x7f0000000180)=@abs={0x1}, 0x6e) ioctl$sock_SIOCGPGRP(r11, 0x8904, &(0x7f0000004740)=0x0) fstat(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004800)={0x0, 0x0}, &(0x7f0000004840)=0xc) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r15, &(0x7f00000018c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff08b72fbf769e0a848450322dbb78abd55f487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41655b96a671164679079d000000000000000000000000fc7d"], 0x15) r16 = dup(r15) write$FUSE_BMAP(r16, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r16, &(0x7f00000000c0)={0x14c}, 0x137) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r21) socket$inet_udplite(0x2, 0x2, 0x88) r22 = socket$unix(0x1, 0x2, 0x0) bind$unix(r22, &(0x7f0000000180)=@abs={0x1}, 0xf) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000004940)={0x0, 0x0}, &(0x7f0000000200)=0xc) setreuid(0x0, r23) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='\x00\x00G', @ANYRESHEX=r16, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r18, @ANYBLOB=',group_id=', @ANYRESDEC=r19, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r21, @ANYBLOB=',fowner<', @ANYRESDEC=r23, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r24, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"]) r25 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004880)='/dev/dlm_plock\x00', 0x1, 0x0) r26 = socket$unix(0x1, 0x2, 0x0) bind$unix(r26, &(0x7f0000000080)=@abs={0x1}, 0x6e) r27 = socket$unix(0x1, 0x2, 0x0) syz_open_dev$media(&(0x7f00000017c0)='/dev/media#\x00', 0x101, 0x40) r28 = socket$unix(0x1, 0x2, 0x0) bind$unix(r28, &(0x7f0000000080)=@abs={0x1}, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0xfffffffffffffd86) r29 = socket$unix(0x1, 0x2, 0x0) bind$unix(r29, &(0x7f0000000180)=@abs={0x1}, 0x6e) r30 = socket$unix(0x1, 0x2, 0x0) bind$unix(r30, &(0x7f0000000080)=@abs={0x1}, 0x6e) r31 = socket$unix(0x1, 0x2, 0x0) bind$unix(r31, &(0x7f0000000180)=@abs={0x1}, 0x6e) r32 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004980)='/dev/cuse\x00', 0x2, 0x0) r33 = socket$unix(0x1, 0x2, 0x0) bind$unix(r33, &(0x7f0000000180)=@abs={0x1}, 0x6e) r34 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000049c0)) sendmsg$netlink(r0, &(0x7f0000004b00)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4090020}, 0xc, &(0x7f00000046c0)=[{&(0x7f00000005c0)={0x11e8, 0x16, 0x508, 0x70bd2d, 0x25dfdbff, "", [@generic="2f3a620b6f27f170c3a5dd5829ad45c3c1af9f5a06297a727dfeb0e3", @generic="6bc218624dcf0f64bbf30d2ff7000159b7eec2c10fddf754e7cf4e4f33c38cf6ccde746e56518ab1bb7f8cf5635b05039636913481e702a49fde0ef777804f3d2eb5e4fb95863058c2c9e89e78643c439b8567910cdead626f8f9cf8d7f32debc0263b0996fbd8b4d42d180a796a028fbba2ae64e349130199f6cd084b4c31d864fd1cb2ec07605ba88c06ea8c96062c28713049d189be54a1ee2739e2b65cb3f39d47b3551d216762b8b8e8d9654b2567f090df8dab124173b3ac8bd35685d37ce77597e9", @nested={0xf4, 0x81, [@typed={0x4, 0x96}, @generic="b4968fab030c715e9496c4380ecdd9e41ab9be07d295cfd98913ac97a1ca7b4e6039dfc95ab1c83a99d38cc683b41922b77533abd1bd4a402825993d0e6f10d7abf2", @generic="dbcb04f3bc87b99c23f9f29878c213d242616423e45fb0eab8392bac0cace35c850d1f70f48356f1f2127d1bd687fda9c6244a918386b757ec59be5cdff43a626595557d4974aeea5fdb65b917055e0639cd6a75f4faed384e23966267757eea24e9e636ba243492a3a89c34bf9ffac20a1b25fe4a9092bcfb4975250b", @typed={0x8, 0x6c, @fd=r3}, @typed={0x8, 0x52, @fd=r4}, @typed={0x14, 0xf, @ipv6=@loopback}, @typed={0x8, 0x4c, @uid=r6}]}, @generic="f3576b1819c88caaa6ea9508bfceb79e436bde3a2bc9bea9b234f28e88fe8c58efb427b5bf9ced885a20aff9f5dda6e42f394fb11466f3a511fb03d9cd6adb8c4f45d8df4c4104e99ac112557c01fc9ddbf6366d9f4bd91d2f9c21b22d0335835750e2ccf1971f33db3522d93671b658964b1d2d3ca87e42705fbb6c58c5cfe8d6124b9415afb68e5e3dfacef17c50449aac3737a3a458be46cbb769a0c7024aa3a4d1b7fcb0ebe41755a039732b1dddcbf185d7b89b4b154f93f5e2978ab632439f50661cd62477e30973b5774aa599db0bbda7677ce31593dfa2ab0b0d4790f5ac1357bb8952657ec323040e90b8e32d5f05e96248e236e755d39154db7409809ae4894ea84ddb99f1413b349619b932986594735d8c943d175fc8d6cbda23d99d4c5496f70ece00e85780330597837919e89e8e7e1a47076ae563ee8d4cb58a4ea42a7db4d9e8c8547e388e73e2f57288a0c8266d436f977014f3edcc486b95173d921fe7324955c0519a39d973491c40e1fca1677d3885e8a0aa24821d42939a8309a1ee413ffe81033fbb8fd73ff7dec4448d4c0946b98ae68eca9e3c1c79dfbb1dc9de58dd721d00061441342c6c467f7e04ce6d3b3e5ea5cc620a3f4cfb9b1e02e0ebafc3a0f5d132fec54564c6e4c81a2e5bf225a000af58851baf8234db7cabc8e833ba21c7ee340321fb1b496e41ff588968af6a4a53fa520fbed276577c04dbc5e6a06e787f76bd0c832796d998203c466e1ac1ee0594c2bd237376bb19c025c92ffc2d2f16bc70c623a490ec402f26775fbe472c7d7a718c500e5d048d2a9300ee219e23a441be477810324e75b7d6ba2c31a580d6b51c55d7d54ddda1b991b218e95a2c78d3c1a46a8cd67351685bde91e47d474eda99c53163fd44f6a0988ef0d75934e19587ca674c7ce24c97709594523b015ad1aa961b2784cfbd10869136a408cce0628fc73b1713af4c5a68a2fb877a94cf2e0a4ac48c7c4f127116230248706138dc3d1963d59719c95baa5f2d20235b6229f7cdad1c761278decae5e950639bcfa0d4d6604a2f6c121f5021a67985d8308efb056c9ebf1b263eaf446e80050a84c7266fec89c4fc2e35a027da3634635b1600733ec6c7e63fb5f661be522435a37ddf6757fe7e3462803c08dec3dbcfda22cab7571850a444fcb978ddde816a308c0b2a6f7e6e62eef0737537d67671b4f81d3251f9aa16d7c35f2396c623e7bb0a4c350f096eb27114161d475501baf54f9f9cc8432923c8e7606aac91ccd5c882df3149ab7ce6e2841fb2d6f7423f98d022d480f19b200cc94b497d5ca6ba3ae9458d8c8db02497e47ec901cd141cbfcd2fd833d12e51416c429aeb5048cb2f09077e93e1cd5d4bb4d8935c8831100b5c5e5a5cf66f1b236a4aeb9f2ca2279b1db9cf0ca5fa3a56062ad42ba3db4929993f10f2d929ea8adcfea8fe189786df45cf3031d9e43f9a2b0d1d7faddeaad7e6d165bce825e3fe0f2150eb7b2b059659db46d805aa8f016e10e8875f53d38d29988eea8cdafadf2b686fc2008aca04dd44c5d3a18792a39d8622284728d565829bc9fce5d5ea67cab65916a54ff5e87204a05ae7d24237140ace3e57b4287b7dc86fa886c4887297dd451a748517776615c24058306a53ee5fc028f4be494f3a0e3040a7af0a1175850ed4741ae78156179be4b24010d7e284787b22dd7d6f573f1c63d96b51de289696b35cfa8cf081729a640a457fba9d4bd37f699896a5c8ce39e19125c3fee343c86bb6bd12a69327c6a7d8d8bbb393ffde3dda2dfcf946b4d4f79074b84bdd976179336fbbacb9607a2805887644f27efa3078ad67b4ea8f93bdae29f7b0b04f0f66f00e168615ff343a5402ee3ea86e4e700ed78e2f8e2689624f18236ecc53fa39eafa227361fff8d819f9ec1a304c0ee947d9ba58ffe3b06493bcadd052e1f5a22e52ac9c8bf28852c1e1042008f1908f4a09aa0be9e6436721ce12f82d76c921628c58a55ae5206e27ba2709af9fbb09f6445f3a411e6ddb91fc74660d663c9eaa5eeed65b647daeae099efb84eabde54ae6cfdf9e8868958ec918d437061a3f9e099887bc8c4f26d18cdd65f546deecb416f0dc901e3add8e2d0d671a08f7654b3f601885fa18e45e7707481d9619c0aef655e3c967a7b842f9e585ffdd7d3be49468e63ed34162a8b50c9cc9a7992f8e502f89db91934b5656cae3868d6a4b7844dc70bc6823748a0b75ab8944ac9897011a73e5705b2aaa70255988940e7b123572ace85d322e5c8a6e2999a17f9d143424bbb372f2d1020383c818d94b2781cdb8ff2730158a49d256d9dd7060a280d829936ef0ae7078a4e0144159dd0cbb509f04e62fbe4912b1d0810815fd29743519813ee9cfac48219a52711f62bc93c0483d7e07f10e62239f11ed2f8f84c780c4717124616284997168b1dd0063343fce41e43fe25068d1002ddf054472f3c68516502b35d5eb59ff74423b615271cc8d56f1535e930df881fbc7db31eb23958e9b26b53abf9469887cce2c6b8dda9577abfa654c5af853d0c70a78589f196104bf255b361bcef9943533605af5291a41b1fb75f69d90d611682e5a0cd4e30feaa43ff54ab49a4e0959ef52b06255aaa7ae9aab1733036623b95967d2e9a90f2eb961bd55c3a214d54cc1fa1ab20cd0e0dd1c2d9af85a784875471209c3d4e982a38fbbedc3b341830728edd651b1975e3e92a32b037267e2898390caebe34a7f2d2a70920e61351f9dd4024fe82496a97b8136c1e8a5353bca9f8009a9954d1848212f6c85ca10f4f2f3e2d1bdd6741d5063f977224489b97a5a426d4b6cdf4ab82827a6031f7bc92ea3a926a7fe4b6ce0fb70995c8f1263ae14fe445797d106cf745e2ef08f825f8f620479db4a126be9ffa464e9c932640d678c11b574aa74163363fbdb24102808ce24b7f6a9b1e9c04c748108a7ab5f8a7c114c0e0c19f7d1cf365384cb9e3e2b7025bf57134428709f57daa82ca19727f008125e59aa8d711642635a2ce8eb2397d6a3b67e11f66d8ca320fd79aeb19ff35b29a8033b59bc6eaf79f14f245bce02b25d8108b0593e0bb23077ce28ed0d4cd4856d52cb0a44aeeeced57398c06b1d910bdc2156f7688b5d9eef98cf5fb83e539f631c48525cee7308c4ec28fe54a3eaa88a774e4d407936b9b65821e9d16354845296ff078b41126aefc7249dfad3374e299b0be331e8e770b8b5effcd244a0d29adc18cdaac9ca1ce27e2a65d4ce76bbd717e00f85d7666d91132f944cbef188415c0f83dd0e6107e8833b9b15ea68ef45f543eb585516b363ac253d070d1396aabd2fc739ec814a6c62a720a2c5dd64bedb9a70e8252dc9617d4d990607a111e2eda2df4f26da176e11b51d65535b96edf4d05688d6629c5caefdb0f59bef75bc1882d11cc8c3beeef70ee4e4ff4d5153c344ed5532654d0ac8608c8a280e874191f35599335567cac6d881dc60fd37da18fa7aa5efc622d13b975219d2ef7ab4ec500f5826e02141046e1c21b35906ac34fd266e8a896b623d349e4567adae7d73f9f1dcfc66f96cf7db2912be39a535e9f53e9a2f6c15dd56aaad208a9d2331731a390da17af5d1eed48cd0d59389f63186944ee18bb3c217baf50455d71f51252f2830b444eb37a10722872f90af5fb5795fe6d685834b723db5f65758b35b2440fb1480fb1ad2de7653e1b034ba95f62a0fc3a986ded97fc55634a00a34fb8fe16ae447531e59e4dddcfb0a817d5cf4598bdff38ac4e0a175c285f164100a9768e78aebd23dc16cd6057e1a52e61f6d01431d904acc669a569860f54c5c5d6dba16bc8c85e919a8078cfdb0e8669a85b963f5f10efd936b5dff71e4725b9085a56b90e753214fba27bae9ef75a5f8c5e2bd9cfb47de9bf0b50d0f7cdd0209e88db9941e037bba869903a0f8c52fb62ecd38fd8f2cdec895e4e975e643a7f701f439ec89fd4289751715cbb1967a44876b83c46b40698ea14e8dcb2474f7a53f83e282c2e94f9fea150f99effe62979f7370a1676dfa43598bd985dbb3e2455fbd05a0f940754b700f38892da6824e670871e3fbf1b4cfc2db48978183ce97adc4d5d98dc6685c04e59a24aa5ce24bdb9e66424ab5e53189782a9aed93c2d96c78369a40fa73481b3d8badede1aa054d83c13ca09f35eae6aadd1391b1fda34e353a309fdbb72e0dbaf85e3d5a0b37f8dda33bea55e76766420d939ec1ca543d650889cf087c0f4889c252cd7a604f61db2e42f284afcf4d6a1d56d86531bd7b96fe865fba35d5a9d4990d5dcd30c54ed5e3ecfa6b0e431b13232baf7f07c0a984676b53f6f7a4a017c049721e1ec0f17b9929b2accf7e20c730e7ba2c4a679597c3a9a58c816dfcbd6f40242a212ba365f16d0b2e4b8dd4885b76469d7cd69191506c0861daf21e829d98bf80e9cc3a9d58340d0e1dccf51e2fc32650d8f669a115135ef1c2a2a34fac1d2a0b79001d4113b66541887f17f9eaf0fccaad087b04cf1a8636ec8639acff592b9cf27853cb5e0c1fc446e585d133e306a03ccf4549974238ba721460398b8e474b46f4cd5ef9e4b67db537f464ee996871559a1962c1eb8f08afcb45433d18141c1ebfadc944fb1494e91e850b0eb4b7dd85f7b84865191430451ca653e938a9be859fbfbeb48fd12b21d02c42348f5ab92b9d8065916f71e485b64ba710d314161a8c790d79587951896301a089a5bcceafa3665d0b817cd4fb89a6dbb0205d6025104a5333bff0842871230acdec1e263409b95dfa0f7086e9d226d729533c7554aaa4c98fdf98e72970d608f884dc6778eac17489e1314f9893e30ae9e159a1956061ed658154c77f64f0311ad09222b0b98300c4d5a0b5e073952692d9ef5e614c7beba63688817946111332db0c0ee25136586c574d950fb6f5bd5a608988efa4d7b72c9333ec8934efa9d10d1116e3f4b8a23886aa1fdab91c8f8898f54bbd31397fa40ca0743a39436fde2aabd7f68a37e36385f688dc055b10b9fc9561e3d37b7a8505b84a1a2cc784667ae9a762d4d5f9ee536b895a2f8a24a071e965f0237a24a07bc5584becf8593aaf95df6a57f281964961f660d2edc4f256201c1e107f949ffe052ba349f4c33189858f1ea0a749da927a2659d146bd182aba4eec83df9d49f47b7eca04e54903d9d34335fd2e0b35e2d5908cca8897516ba2fa2769665b9d3c8d01ceb85a14f2a40ea3092bf724970b0ed5357b225f723ffbb34d531f756dcf04ec42b4fbf09cd9766b35f2decb57af97627398c9afabf25bf6db1cee8e8d7a666a6104d5258181b1627e5945edcb8a84f68e2d839bc7fc188b160036cc599dc7339ff1b3067f8463a2533936099a2b428dfb74e543c809c79e4f495696ef82493c6e61d68ff3bf9dd230281c13bcbdc02a5e7b665312aec6309b3032cedea5d020c04f9379be09e33f0009863c1030847523902f36714fcbb49e1720377dabdd4a15e5defc79aa34a514d759e4adb42f4b48499cddfcda480b2edd5f5bd9abbe9bf785137a4d73e3e5ec6de8710cbad8013515abf61d17efedd0af0ba864af335ff38e6a113c0d39519e8ec672dc1910898b74940b344f0433b4537e2ae4878f36475985ef4c906630bd06b01a85de56edbe688c2543d94eca15d9bc6daaf096c1d24aa0c1338759d3e19c90786fbecafffe440fbe06da2247c2df46ab6e1f52035b7f5e9e6c591ec9459a01faa1f952a8a6341745e06ee3c4efce24dc3f22acbcd40d87171ed517a9f085a2c3ee3d1758f3631f"]}, 0x11e8}, {&(0x7f0000000140)={0x1d4, 0x31, 0x400, 0x70bd25, 0x25dfdbfd, "", [@nested={0x1c4, 0x4e, [@typed={0x14, 0x17, @binary="611d26c13fd6fb83bc7333b95071"}, @generic="0f0b17788f51deea66fe4a770fce0358e581abdf04d74eae443519cb81aab4ec37d8d409679289edd21324ed2e6fe6a5b2f65a45c231a2f1c5a69432e0525d685c2958621d226670e245b4d27f38c595badf23d45b9c58bd5eaee9088d169e1a06df52b39da3fa0e005d21f2a4b28ffe171c84c844e5f1508081238b5ae1f12cd582813d47f72eb5fdc098b859590263147e2b72ba04ddb67cf4887e7ddfd1dd680d6b1d640f6ecaa6e5945da124b41e56d919b7ce9a7c8cd78520549dbc330979cbf3c6df132f3d55a7795dc888a0b2a1e0c5e6bcf4abd42ae73876e3e9ec337aafdbaa5b202c081dbc639c8ce45da17557a8daa7432455", @generic="3294aac81728bc750b956deb0605afa21a2600ea5695e23c4095a20e9caa915cc5dd63e0b11f161ddb11d2b5f47f64f6685efb69bdd076d9de8fa4a2b9714837b51d65e0357067957265f9ae4dce10bb7a10ddcc079d013e2fbc02cf1a9f2e8dfe6f5d349fddc50d0134b676047cfaa56f1b086311feecccc09c0eb0b4e70293369d9acfa6ee04ec34d4ec49a084e074b1f66c1dfe6627200f04b9d447c587", @typed={0x14, 0x2b, @ipv6=@mcast1}]}]}, 0x1d4}, {&(0x7f0000005200)=ANY=[@ANYBLOB="f402000035f708ee00008d00fd392f6f86e4afe656c4ce22db012558012c0008008d00297cc4f17f1f2c692264eab5bf1c898ffb291056607954bdd00c1db021012e4aa288b8fcae2d48d7c9217193ba57a4008000e0c9788e42fd15e604d68280bdc9944091837a2cbdfce6f2d6367e7e13a035e76f25edc4a3923a7bb31ad63b3afc06e47b4107ec17efb8a949ea92c03f130e98beb6b6d325c74284ace1e1395b0cf5886f159f00af74", @ANYRES32, @ANYBLOB="6d868f7bd5e9a2a52c6762ca272d42b7d58156455143f475ac56c2265ac56297b4d2c4cc843a4676ff848246024812adb9abc89e2fd2acfbae595b281e5ea2063a57f0689e22584320de49fe46f3f0aaea15c40476c93b71ae7c273eb82a3ed3477a0d1d1271e81368baed535e2ff69eb52bc6fe5b32a66b6de9b5228188602d70a8d5dc13b47ace819bec3619eaa69dcc72b61a2188a411d88364ba3a95c52719cff59aead2f5335225fb83c80cefc1a68340829c4949af6576de0f461954d5793e316b2ab68c7959cb4511f948318b1d8d1c49a247142fbacaf8a3883141964c6816c88d95aa428548b079c57faaf2ea34d8648cc5ee4624b34be58bc43de58bf487850c81aea00cff176feaa4f9015b5da90a1edfbfafacc096a75ebe53bc6158841a21680cef2304bc69f11ba69df214107c105acc229cb069ecb5426a22998c0fdd96b1cf97bb6b924863081438cbb273e514006100fe8000000000000000000000000000aa7c00960014004300000000000000000000000000000000018a497e43efbbd13e3cd958f0bbd123a3872d5afe6abe4ff40f718f3796c775af8400ac24d6303e63b6e48e77e31f30fe2422828dc511c3b185d7f4de6cccffc20c2687b9b0e931bbafa914c3ad2001932332d05c727b66ee45400186cae41a78c800000008008500", @ANYRES32=r7, @ANYBLOB="ec00120010a64617754e6a4d4eec69816c562b110f2bd90c6a08c1d03dd2c57d9c16d0b4c253c915904c7cb0e63af9dd2aff218b1d6a584e5087eacc2b97f4253a10c0163bdbf3723776e8d0620e5a7738b9e8bb639d1530f397990eebeb59c3910b20bae4f01307cf8c10ef151b44b8502adfeccf9b2cf049142d76c87db8437621c8a40f6ca98bf23a596cfb86bd3e1001a74a597ab2fd57aa2c14a36170f7a6ed30e232e6a34c076a8ddb495c8f968e5cba24713f12f234e47d30dd0626e39c9d1f5998162c6a1b7dcd0feaff6cda2f331d5d1ea43761407231eedfe17b60087ebb2708001400e0000002"], 0x2f4}, {&(0x7f0000000340)=ANY=[@ANYBLOB="e8000000180000032abd7000fddbdf25ff575c6cd4279baa39696a89bfea2f159466811af3304f066f3ca9e926551c9ba32e450dd5740b7892e6058a46f71e359acfb8ced0bebde9eefd1a84773a85b89c1e36a1804a8f0cfa9453f766dd167ee9065d95b9b6389625e5d099269e19e64dc2eae2d7f03d14dc154b74c0458ff8285ddff1ed5c0b98672a61d36c13257f92d2d57a5573bbeadb88721469720c3c03e46ac9f7010b0a1b34fac3d88df88ac936c541eeb2c5bc5acc9dbaebb57a66aaf1dc7e68b08408553b0746c25e04cc48fda230e874f38d37fb2cf94c6f080042007f0000010000"], 0x1}, {&(0x7f00000055c0)=ANY=[@ANYBLOB="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"], 0x250}, {&(0x7f0000000040)={0x30, 0x10, 0x8, 0x70bd28, 0x25dfdbfd, "", [@typed={0x14, 0x92, @ipv6=@mcast1}, @typed={0xc, 0x38, @u64=0x2}]}, 0x30}, {&(0x7f0000001d80)={0x290c, 0x35, 0x28, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x10, 0x50, @str='security\x00'}, @typed={0x8, 0x19, @ipv4=@empty}, @nested={0x132c, 0x2e, [@typed={0x158, 0x56, @str='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f'}, @typed={0x8, 0x96, @fd=r8}, @typed={0xc, 0x5e, @u64=0x81}, @generic="c57fd62a6e562c725f404134e74a54aca893d490ae7a8ce9d032c4f9731a2a5bbf25e221b20ca4601be8ab73413058de92927afa54db3e10f1d068bcee7f089e204c5d08f112711e3813091993e87b50f86f1caee14e57ebefd33c9bd797b5675f8badc338ab81bc04ceb432944f79b467c84893d228eae939d9f848bfeb6047a3e806bfad2622b2ac411a89d12a6e2b3da8651ca9de29496e0a00008e7978", @generic="33443691ab61b0f5726c495f0782316138212faceb1c30fcd5322b39ea0b81be03e5f9d991e3e30cc33e4d73f1476619e67309c03d974de2f9a3f721a28756fe5f38a3b37f08aefc8de073d4efd5d855f7b7d78e7d6b6b3c45e12fb7a97ee15e41d77461bc6fcdd224380a4551e8dab9a3181b4931d6cdeb700dac917585f1cd59e8486d9d82f9a60baf44fea91a400e5658ef79b473d0bba94b30b4fc73b5ee01d4ce47cfe7652034d1a9d6c99fb7127bf7c0ab66cb24004bbd90f1d1", @typed={0x8, 0x5d, @fd=r9}, @typed={0x8, 0x8, @ipv4=@multicast2}, @generic="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", @generic="f635d899d3e3cb50b81be34880eb5ef191222eb17b5ecf9290f95aa7ec8a8b4f780df5fd006876f4a4003b7b9511b1c9dd5fb7c691ba64c4b7378f595b8aaf6f1b1f7290a3e2202c48f19b9bf691"]}, @nested={0x64, 0x82, [@generic="ee9ac0dbbb50849812e7d6fbd69235b5f237ffeed41242a7a06a7698bb7ccaca6db7ce5e91cdf1d29e9a389ea4faff44c99e016f646c14714c15ffaac65c1c9f5b255269292c755b1969f4d507", @typed={0x8, 0x88, @str='/\x00'}, @typed={0x8, 0x4e, @uid=r10}]}, @typed={0x8, 0x53, @ipv4=@rand_addr=0x7}, @generic="5a7ef27d6cd7afd0c49f19b5c15f3f775ca4f025a322ce171cd5eca3f7425002cc3f116814567c92587e44369036ea90dc4f8de819d90f2be464db38958fec1b6c465128442635197cce98b25fbc79d383c0bcbe3b0518efbb2e7fb86998358ce9f33deb3aadc6494fc3e2d1ff27971d4b7e30ba9bdacfec120c811ff35d7e4874d27c6614656253d7def00bc8b05514b04187ad607623efb9094d28af", @nested={0x11fc, 0x8, [@generic="503e7c93ca83f8e2262986a4c3cdbfbd2f739626a92f2bef20a91c242c186f7cd0c22952225f4ef771495358ddb4b4f8750aaf142de56c70c774b6c32b7d81dd988043ac41ec71405717fe8e79b4e3448ff1cde479537cf204cfd76c8c50e8a0b872fe7cfa9da4f63228fe4263abb70fdb86", @generic="510d8a2a150ad5c10a4e99d53c531ea24cd7166af25d5f48cae5b3f9257d1cdcfd52b29a9ec2c3251455f60f19d991ab6e017feee0698be1debfaba6828319b59af2a895e6878af2e9b2047926aa7adaa0371f5c6fc0689cbf23bfca922b6416d22131d0cb0e2eddd0a25670d18ef803fcc86e093f960a57ae707e6e31c12eaaac1f88c0930dddb3d09dd689ba8a21e8de1ed5633df5978a1f89f3ab980a34a0455ff512d0795c1174a0bbf308e9dfd749e8dc2d78ef84e770177a28579302ac131062087cd4bfb0ca09f5ccdd448be0bc24e26e13a78d4bc8ba3b37f050ba77f558a80f8a87635e9408704ca788d6a601c0e504bec7893a225163dc28d1d04b4e65adbf36708763e6f29d5c317dc5be3ab5f54c6d4c31da6dc2e383eafac09d2f5192945639242356ebbaf3be3f18b9195fb8b7864818ea5263fd11f8618f2f05edf3fc5ab7185ca57ed96168e1c390113ee3cd380856a10fbe9ea87169fb7da6e0488871c53dfaf53e68f55bc815f4f321ae19eaa51d5ac2347e8e06607b146f431a974e66cc23d47d0830ceee3a012e6cdc46fc9825cd6ffe1d8ef252bfaed2d15bc09deabbe1d9e26cc5aac0a151ecc38fafaeab4949238022dae76567284c1b644242dd51d8be4e0886f007e9175d54981069f2f7af6ad4561e7bafd12206f9e34d75834857823a0b7ab4831b3e6fd87fd1952f4b301d5237e3e2cd3205d2f0e18f20e2f3a1a99e2226057af4309a45d7f6138e4d3b18de68a80c46abab2aaa7c69033178af5c4a5b64c7963bac0f70a8aa92e5b2d9069a7babc1a3b86c350c64878ef2d569d3f21c6f0f745c2cd3fc201cfb9d1bc414b5595f918a54159d9b69f8d80eca60efa994dbfc900c4854bd4a3ae5d00d08e0a8378d7377a51346a6bc4ddbaecb32b0b9449767980cea16ee32fa00da47abe37f248bb4e7a3d4f4d601c2ce868b0f80747843386d2c60e5f12ecb8106877b0599acfff00ed673721d935bbedc881aec7af1f369df6864f1ba25a4d94d3400493cbd39471fb29536e5152b1d47a6c74c405d10a89d97af41db5c20420d0e67e175e5a484e824609d64ea504bf241bfd1d84540cdc2a57beeaf1e597ea5c963b924c779b908270740fd4e53cbd33f18440eaa45ec972668cf0d199011907c416a98824bb4820d3105b77f3332f64347e277e72333974aba2c1a10224e172cf7ba36ce4441dfc0aa9280bc568d830001b6b1118adc57498fca93e8d6450ae93823d32c7ed5bc2e3c99e751a17409f363f49a9cf5cd8b31be73fe5d4296f3991d96adca3cf9f6c811d70aeb8cb21936ed29bce18c6d7778b512d8a43acb25289acd1f1deaad33ead2402d799f90bf007cb96e8f08c70602ca9521367e01db374b4e6a08f754e5f4d8a80b51740ba670087d516d8b278220e101132c11c4421515c66acf5063684b6a819d9cf90afdefe8494e3a8f64263a10232c1498fb943c6540f3b32ca535ebf29752f26137d07e88b2c1aab881a21f845cd80db845c282aaed9b2c26f5beba2c61b25a8f1359e8fe7b751237cfd0c07c0a848815637e2761991a5bc9f1669d1caa0ea9310542b9d696dc5cd4bf360f5af06977cfe4dbbe19df1e591dd18802733946fdeb08beb945837e37f31410693dac4291e48627e2fafe70455d9986f766cbd786eb356b5d6c0fb21ddab155239b0ef727e72acddd4aa2831b7217c18c15507cd17c499586184361fa197bba7b3e908b685f6f9ec8e125f0fc02806c1a4970526f122ccc0ee8059302709060cf0ac7da06524e52515488a1dd2273cb5615b703d5fb974f52958a3fae08bd8fc8315caf681eff9279f581f64d2b9e3b99ad2db788d27584af28df31e71d0c0e9adcacbcf7cbae6cd1c7c570fbf2d73338566a71042affec8acfeb4bacd4c38d6dfb08bdd29d9d22c0ca74601a9720f3305de1f4d4d308a43df839df5a298c97e28bcbc96828d6cea672fa5e5616dce73d50583fbc42a324f303278a6446b5f8f0d18153d70e7b85ff23de05caec7621426ef42b75c4dac96ec471e59379f5e3402480dbf9d503626317a3def75fba7100b61cca4eb46a2bcf93fcb40ef7c9605056a83952168632cda9eb70dfd0d6a9f61425e12cdd686202bc7bc1e6c98eb12b8d47ce950506c5e9a496d0cffc675872a714b367b86b85407b10692e4a99eb8069ed5b3ea120bfe920b5a7295b3ca862095fd64ef9dd000f336410fe1532a0052fce643589aeadd0fd93e7293c0201e742e7fe3002711f754e1933fc2374f81439699682c86d15025139ba9b0f3d0ff7ef98a5b7dd9b8c0a0a18aff07ebd5a03548af58dd06844097eeced0bff5e778979debd2a9ff954575934a416d7b9fc6b9a2965f7020526cee09e53b059046f255183dce2eb6764847b99f03d99bc369e4cf27d41d942022b07decdaf85e092ffeb332a0cfe17bc38faf4ffb2b795caccf11f949a338f2944aeb256d2df80ccd48a9da6245bd5407851282364f4e03fe7a256b7c6b3044b5d002cc11e804f8617f665cdbaca716331f957b3ab81528af4809e3b9b918648d0e2fe2bdc450b2601d1e5bed88736a6d82c81b0c1a415b7e6f295c835bd97a5e2342360137e824cea76813d766156bd95d5919558b99cd20baf1cee517f55c373fdf0f65570eecb0dcc3c3f911a17bfab8c90e7c2599f0640539e01c3b77014828b0166da8eba5707310c13c80354176de9b0d30b180ef9543636d689d90cca1b1dca3096ed0bf152d60b2d90f7ef90f5b92c4a2874e6726b2d0f56797f0d282ef8dcb3875d8ded947f41c751497d80fa65e639f63b1cc21ecbb49b52e3cdbe2f32584b168f9ed31a2530dcd73d57832d6c39169c87d7709d56de75b4a0e0d5635657f310da1523aedccecc7ba07c7210cfe6c03b146390aa98d25fa3bd2cd57bd4d84e1365f25240114aedf006bc55dccc970c23a6a55c7caa0a38d55eba0450c39c6180984e0bcc0cd4c2a59d2099625ef50a2aa230aeda314516437c273f612ba56091bf110f79206283a7bc04953e83671e40ef5b6e35fb287be0b2da00df6034ba43fe01010f9f29edfaa0b87f47e69cff7b0d2fc086d695429c77b1241500d1d90f0e19f63b3c3567d9faf881183550c6530be6202abc6c8ef5fd0cf1e12f74c75a6683dd6103d2c634140c173246a7cc3245b890421e74cf97b98d87fee752f23955b3a53cfd88df3b4b37251864d76e22cf8b0a6d448a28dfdc632664ccc0ea6fa0f6fcc22132c0601c046450fc47948dcd10b470a1590fa5bda3a87aef9c95451ca7627bdec2df5eba7964cf6fd48a06a82fbf4460a5e5207f2f01048e2269eba3727ae71a502e94ab9e325579e7005661d836ae23c49a75a9e97e9a8f20148a7a2847a53fffffe0b4df5839b9df50e1e349068f185cfe152d05d4783caf43644c155c3f1aba00021758b22d6111f55f58b6e8f4a5675fab92469ab36b47b07efd59193707140ca4f23446f9a6962993ace025a5582a86e62fbe6c7f092ba63641d6f3ed67fbfea90cbdb77d72173621f96cc4310005967ea4298fa333ac825bec9cc0c14e313dd2ecd1fa71aeba5d0a474e07dc73d411b847165342e2946e5c2ec0dee079711b1fce6d59df9017e85e5513612ad178ac406e44325d2cafcff21abba433b268aa58233d9d0d602893d162dfc52d307a15c22b79a99727bbea1aa47c4ae4743d7c2277025d6e3da4bff0c31310d0c58f04ce74800289ad6cf8da6b8586127df03f3bf11bf94d804f5b28ee0ad3e0779ea2bc0d8a5a2d1108f2b6d4368a17da054c04d183e1a10f48d2ea0aa992064953905fbd1ca876cac3918ead6483f4c8670dfdcc2ca8f8a9767152aeac344b7c1e5888cb3296729f0728e8a5bb594508dbd143eac4fcefe6286c9592b00bef15e2dcb0840d9c18b22c5a3522fb7c635bedff37362370754033288f8bac23975790ceb48311e6fb4288ca6b243e894311daad0cb0c92f8892a9e879424feb9a4d0867182bc04f885357714ee2337465fd98acc04d86767904f9e214abaafdc3a8810064e6ab3c845f5261e884071bc3b60fb561fa51910d6e96ddbaa6aee98e6f9c1d59869d67292e281460e7c0d6320286f021d3d9d0ffd041f9c5eb20f5276c8c96fdde9a95e9ea159478cf5086b1a356fc5d367259ca019c0e9be6947aebbcbf25cc34d38770c47834765d8490ac5678e73bfeef72215eca19f266e413a7b963dcb6e64ac63718bd01ec7bf651734b7bfe0c68246b4f52f0e90c32ab4a71a206f0ff48be3d389f2a8cb8aaeff026aa15e5f309363bfe29a78bb3ec0bef21cbba98917dd0d6dcbcf1b226e9a5e42aab6334c1e8ca0a8d916c1c764c49e3e16d98c0dcca1c4838b439df2a50363c53964bb174d6e33ec19f8a796abba664756a931650eadc29aa268754ceb16b6c4cf5e554ed35e11deb3fbd5da9368ce48e97c8c7fd774e9373a1ddf30c7b848f63008abcecc6df7df7401787697348eaa7aaaec75f650537fdafa03414808f53a79017e5ba3b7ca7f6117de6f657957eb62bb81928d7df098185ecb6b2173078ef2939e29dcf9141c5158369f78a6d55563c5b475cbb00791f8e56a58577ecf69097f99eced2e098468774e6eff64ed7c812ed370c97c3517c5744a6bd42bdc22577ef0ac2822a5f4c81721497613df53a793a75a20fb1ad05c1ba3639186f00b888d8b765bd26c87f522e4361d21df0604903eb00f37e3daa94b954c132a58fecbd3fdbaaa1c70c2e6120ce72da5c26513672fc368172fbf0edf9c09b65370abf626aca4c735b526ade4e16e07bd402c3ddc39ad8fe1cdc5f740a2982e7c0cff56845d478c6a6d6261d8956355b671fdc6c67a3e7ac1568d14fb166699ce8aee73f566f15e5dc7f3bf691b4dfbe7e53fc28907bcc657801064973656bfe735834c5e11a137969ec781863a75d6101bfe88c4793683b36bb70ee29e450b760a057dd2d7c1a368cff4a60871c91a56d13631d2df67c6868c9825c1cecb6407c007a1f0f4b6d7ef08e531865e08c52bda97fe49cbb3f960a9a23c5b5e8721bf2ea4cb26175739281d30bd0daad9c1d2b17b91b648f9eaf845ee03d531abe5723913bdb471054245fcd8f9b7ec5876c7d1732f2ae3e2369dfffac59eed87961ca82d0671b65056dbd71259879adaca75458d67afbfc471c4a370f5b9074ff855fffae26128482a209aa6ecb908075cccba23d8e29229f950edf8b5ffcb3a76c97bab6281edb79cbead7075bc81c2110005d197a55a75af20f86a5c34b60664a2bca48e27c7eb1ad826340c4a71c9cf7e301f0fd8ddf91610ddd8e550b7023e2f165c07248335948b92dfb8775935798a2074a06a48ce2206d8aafea949b9c20f914a37b02e732f80f5edb004313434bbe332c323837234d88721440cf18f7bdcaadd3b9c73a8ad0d8cfb0a72eac73df704926a8f9bd31740ca061627560258914bcaeb2b933617e47cbe5542343110d2eeca3291354a71876dc25d4413c08442fa28e21fd71c14dc92b801e6e853ab65604fc0adcbe75b71ac232e0ceb2c51ca70de1af3160b96ee4c98a3e9ff1471d75c048b212127801e0b33e272051b31b5cb75f7d69d3c366a23d40ab2e6f8e0392e9f02825545decc7dac5011b6481591ac0c08344a11ab5447964f3d92bdb3a4deea70b7c557cce8ae2d84aee29045cc7d96a35d105a6373833fa18ac41cb8a01cdd1271630e06fb08a7dadeede2f40478947a176b971be9fa981409e745a1a74f63d34f7ce4daaf916a84e66af11b6a4f3f80d", @generic="8c39008a78e82c7af97db2391a4c3076c18c48bed98b7e64d37fc826542514f4be745601e97e0605939c77d9dca8369bc948ca270141da838e0da90bb27581d298a6caf48ab5ce8ec6eeae872bdd3c07cbe8edf13506e0a02da0a3b75e805051f78b25920d8d6acff1336028463ecf103eccc507dd595e496aaeb19b90c36636d7cf704ebdeda7be30338ea90ebb8c3da2664e972e84a7d0598663500c8e2ac11a5eec723eaec80bd6b2f03abc7f8cbe64", @generic="f568d9b13b3afc15b990fff88578f9ae68cb64f6cfff05679358719bb517c393f6cc53ae6345b7f6ef0390fbca46b8e545c90fef309e61039c48d0ab8045446ccca005be86e5bcd8bab2a87cd00e3ada4f6b02a6f5b895f085eddeadbe69c75595e80b0f6b5e3d25824ea6782fef87d0336ce31706dbcacfcbe007346149234096851a27ffa740f2dcc4db2eaa2823ca6b14842642c139dc44ea98ce5a0abb0ac4a3ac8c5873c1684e66670de09b989420e27ac01177c74cb11cb2c45d98ec87086eb3f3e4ade212e279a04e5809b2192a216b6b78"]}, @nested={0x2b0, 0x18, [@generic="ecedd2c2b0a77f7cda06cee66c05b3bf5d275d836e2dcb03e2dbdc90cc41f174e5b2e393a06c1d39fba22e769274e6aff627fb82ae27cb0800d839b720ceb97e7f52865e82d0671bd83df3576fc1665a57414c35e01b43617cc2a50cb901aa4a6809f15fe4483e6385f0faaa3845f87c3f0c748cc7550f2f7707b3e785c9796f5f6ece23cbc28b9316e5f263e002d7b39510392f653bb22e1629b96c35be129c235f90226c468552c6d40aca63df0ae0359bf5e575e9aa128628c1d072301a263bca36ba4729909c24085b9433f2f11da6090baddbb47edc2999295972209e474d40da9d1b71c5107138b49ad6050e7446905b86bf", @typed={0xc, 0x45, @u64=0x5}, @generic="30b7032577a87ffa5f87bbda9c59ed8de38747c3f3c01c73e654edfeca15e1ef7e1dfb6d016f9e5aabc16519120cdade3b2e77c8683554ecd22f1aa4d89713718e02e0d04888740d7677aeb2e0306d3d", @typed={0x158, 0x30, @str='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f'}]}]}, 0x290c}], 0x7, &(0x7f0000004cc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r12, @ANYRES32=0x0, @ANYRES32=r13, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r14, @ANYRES32=r19, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r25, @ANYRES32=r26, @ANYRES32=r2, @ANYRES32=r27, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r29, @ANYRES32=r0, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r30, @ANYRES32=r1, @ANYRES32=r31, @ANYRES32=r0, @ANYRES32=r32, @ANYRES32=r33, @ANYBLOB="24000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r34, @ANYRES32=r0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="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"], 0x291, 0x10}, 0x4) r35 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r35, 0x8912, 0x400200) r36 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r36, 0x0, 0x1) 20:40:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000180)=@abs={0x1}, 0x6e) ioctl$int_out(r2, 0x5460, &(0x7f0000000180)) [ 1216.472884][T26975] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 20:40:47 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1216.555295][T26975] XFS (loop5): Failed to read root inode 0xd88, error 117 20:40:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:48 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0xfffffffffffffff7, 0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:48 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:48 executing program 2: syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1217.466012][T27449] XFS (loop5): Mounting V4 Filesystem 20:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) connect$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x24) r3 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) [ 1217.508636][T27449] XFS (loop5): totally zeroed log [ 1217.516705][T27449] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1217.533604][T27449] XFS (loop5): Unmount and run xfs_repair [ 1217.577829][T27449] XFS (loop5): First 128 bytes of corrupted metadata buffer: 20:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f0000000140)="d2c5ed54012f8a229cdde8abe2c3ab7635a16ac145b2c468fb677fdc602dc0e95209a17929f40d8eefac7ddf9219e9e7f52ff91dd7740364447cdf7d294389e45519f4c445621edd93260f9d0f08e2ddc1aedfcbc731791ec25ade362dc3821e7707ea6c0a4405861234f6be60c94b26a831b31dd8e714156dee5eb3948d449b74f7c7cb6d74f6487795b7671876", 0x8e}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000240)={{0x0, 0x20, 0x0, 0x1, 0x0, 0x7}}) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000280)=0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='proc\x00'}, 0x30) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r6, 0x0, 0x1) 20:40:48 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1217.674966][T27449] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:48 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x30, 0x0, 0x0) [ 1217.818664][T27449] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1217.827908][T27449] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1217.837078][T27449] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1217.846230][T27449] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1217.855379][T27449] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1217.866958][T27449] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:48 executing program 2: syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000080)=@abs={0x1}, 0x6e) sendfile(r0, r3, 0x0, 0x5) [ 1217.922918][T27449] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1217.970188][T27449] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1218.032797][T27449] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1218.086683][T27449] XFS (loop5): Failed to read root inode 0xd88, error 117 20:40:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:49 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:49 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/btrfs-control\x00', 0x20040, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$mice(&(0x7f0000000ec0)='/dev/input/mice\x00', 0x0, 0x80) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="74e70000", @ANYRES16=r4, @ANYBLOB="53eb000000000000000010000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000e80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x9716fcd8fc3d1c71}, 0xc, &(0x7f0000000e40)={&(0x7f0000000bc0)={0x264, r4, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4ee}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xcc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffc0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4a06da5d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x67e7688a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x91b, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}]}]}, 0x264}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(r5, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r6, @ANYBLOB, @ANYBLOB='\x00\x00', @ANYRES32, @ANYBLOB="3cadc590498c0ef80819f9aa8cec", @ANYBLOB="08000400ffd20145549d24178f64563b0b597823eeb7175b751e05ed89b9ebdf98530951019d56b3ddf31e1eae59b3ff67319f9bbfbfb7734e7d6a5a0922dc71df3a0fdda47a25bd47304fac1e4b15b82085b3cff8478e6b31fa87c4e4d1b62c7d9e69dc79cda1f2265ffabbfc5bc6e429f21fda37175c22358449ed535e", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="100001000000000020000700000000"], 0xc, 0x0) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f0000000200)='./file0\x00', 0x3f, 0x4, &(0x7f0000000580)=[{&(0x7f0000000240)="8d3739f2cda50be686928a39831909a84eb1844fd27cfbc6f70cda5aa16f098d0bd4755d3fa679be52d011f6f477ae6fe45eaa4d5497d1b47ae45fee5e709d6e2ef6326629c76c819d6415b97d31febab8857aa1b76e5dc017c81899dfe7c438f468258a476998d2e36ad78060f8c8d4b216e7fc80ea4527e59bc329a61911ab7854146f3c80c4c7047ac866cf88d5c71938af90d175df2dbc40bbcabe5c674738648696e28153dc133e142e0efbae65170993ce61556891daff0184b9f7ef11b7", 0xc1, 0x101}, {&(0x7f0000000340)="54fd0952116ce519b3537b45157be688b294a96ba82f2b34ed999b7e6d849133d8bf781beabdd022701714e00a34d0f4d90ad1b97b6752c3ec526073c2439f4ab18c9515d2fbc80f09c8d4a6f66413f63d23cbf555bfddb8a960eceb7e1c5a5ccd996484d1db43eac0a98d03baf55702d55f673b619536bee7fa016c8700e48920989643e466275e328404cd8f6edc00d988b75a01c7ef558ad38ce3e4d3b1cad745a8f2392b7c3e2b266d4fd86e6b7ffe96dfdc1cda875d60b39ded5be75e8cc94c", 0xc2, 0x101}, {&(0x7f0000000440)="63d14c86eabe3e73165a96fb7ec2c2b3275002a91fda0a40b6376bf3a4417e0f8b1d986ea8c9006b9bfc33235800ad2bd383ff3b638bab97f795643181d1e2b6d1a8b3a8ad3b34540f39ea353aefd92aac58531c1b821804fd08567f45257234982e96a5e6c041ad48fe41770c03f6b011d9533e0112911f7b0b4dac74c588ce1469c5ddf456f8c7788dd3f7edb47442de6924c62bc5ceb12f16f8adb5851456430c", 0xa2, 0x3}, {&(0x7f0000000500)="e4e42bc96a0ec2179dd3afec9feb6062fbfe754238b1f5120e8c2cffe6697e9804719e6050ff2910b4160066395da2c003507973a55c5087aadbe08c2479b4b27f4400f19c6acde70e2a3e7c75f20d8e4b003932aab44b6fa2d5cbbd7a28bd597ff604bc5bf19d0fe46eb19ca33b7072d1131c761f", 0x75, 0x4}], 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="757365725f78617474722c6661756c745f696e6a656374696f6e3d3078303030303030300000000030303034642c61636c2c6e6f61636c2c6661756c745f696e6a656374696f6e3d3078303030303030303030303030303037662c646f6e745f6d6561737572652c7375626a5f757365723d0d766d6e65743174727573746564736563757269747973797374656d62646576ca65746830656d306e6f64657624272c666f776e65723c", @ANYRESDEC=r6, @ANYBLOB=',\x00']) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) fcntl$getownex(r7, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) clone3(&(0x7f0000000ac0)={0x822000, &(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740), 0x33, 0x0, &(0x7f0000000900)=""/143, 0x8f, &(0x7f00000009c0)=""/220, &(0x7f0000000780)=[0xffffffffffffffff, r8, 0x0, 0x0, 0xffffffffffffffff], 0x5}, 0x50) prlimit64(r9, 0x8, &(0x7f00000007c0)={0x88c2, 0x100000001}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000fc0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x1800000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x1c, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000140)) r3 = dup3(r1, r2, 0x0) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) 20:40:49 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, 0x82d84446b247d2e3}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={r2}) [ 1218.769790][T27807] XFS (loop5): Mounting V4 Filesystem [ 1218.812795][T27807] XFS (loop5): totally zeroed log [ 1218.825218][T27807] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1218.855662][T27807] XFS (loop5): Unmount and run xfs_repair [ 1218.861889][T27807] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1218.870785][T27807] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1218.879869][T27807] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1218.892263][T27807] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd) [ 1218.901577][T27807] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1218.926675][T27807] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1218.951615][T27807] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1218.969347][T27807] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000180)) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1}, 0x6e) fcntl$setsig(r4, 0xa, 0x1) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) sendfile(r0, r5, 0x0, 0x1) 20:40:50 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1219.013759][T27807] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1219.085317][T27807] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1219.143496][T27807] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1219.232558][T27807] XFS (loop5): Failed to read root inode 0xd88, error 117 20:40:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) timer_create(0xe, &(0x7f0000000000)={0x0, 0x3c, 0x3}, &(0x7f0000000040)=0x0) timer_gettime(r5, &(0x7f0000000140)) 20:40:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000200)={0x9, 0x6, {0x55, 0xf65, 0x100, {}, {0x1, 0x4}, @period={0x1, 0x7, 0x0, 0x21, 0x4, {0x0, 0x1, 0x4, 0x2}, 0x3, &(0x7f0000000280)=[0x20, 0x9, 0x0]}}, {0x56, 0x1000, 0xb4, {0x7f, 0x109a}, {0x7, 0x9}, @ramp={0x0, 0x4, {0x3e, 0x9, 0x7, 0x2}}}}) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r2, 0x0, 0x1) 20:40:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x4, 0x2, 0xf8, 0x5, 0xffff, 0x6a64}, 0x20) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) [ 1219.912299][T28265] XFS (loop5): Mounting V4 Filesystem [ 1220.005473][T28265] XFS (loop5): totally zeroed log [ 1220.030852][T28265] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1220.080772][T28265] XFS (loop5): Unmount and run xfs_repair 20:40:51 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:51 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f00000002c0)={0x802b, 0x1}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x1d2880, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000340)=ANY=[@ANYBLOB="00004d004927535b24ba8f4f36234113fb436c93ea1e1ccef6d5750a1f27df369bc9aeb99b267f8f7abead7bd02a5a0cb67131ece5e5d769b9c2a1ba15c908ceaafca4ec17e6d25ba3a746c46a2245ae3c"]) bind$unix(r0, &(0x7f0000000180)=@abs={0x1}, 0x6e) r3 = dup3(0xffffffffffffffff, r0, 0xeca65d74714fb017) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r2, 0xb}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x20000000400200) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000000)) r8 = socket$unix(0x1, 0x2, 0x0) bind$unix(r8, &(0x7f0000000080)=@abs={0x1}, 0x6e) fcntl$getownex(r8, 0x10, &(0x7f0000000040)={0x0, 0x0}) r10 = syz_open_procfs(r9, &(0x7f00000000c0)='oomD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa4\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r4, r10, 0x0, 0x1) [ 1220.138371][T20346] tipc: TX() has been purged, node left! [ 1220.144599][T28265] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1220.185012][T28265] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) 20:40:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000080)=@abs={0x1}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000180)=@abs={0x1}, 0x6e) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000280)=ANY=[@ANYBLOB="8781bb9636ba006b0a7fc89110d5e5e5c8a34934d197502eda9cbc3170f5ea5dba2ff914669d12e85f856a56467c5e9b6d703acc9b5f0000000000000004c78c0ed049", @ANYRES64=r2, @ANYRES16=r3, @ANYPTR64=&(0x7f0000000380)=ANY=[], @ANYBLOB="50e69553f9d77a08dbace61f8f3d236e9d756c812b6db8169d7b49b9f5bf781ef83848c44b28873853bfc7b3e9556ca52e3e93c9c97cf2940cc0049027bb35b53262e8a42158a0a5a306bb2e4b84c8061854b2530fc70de2d7b3b4e39c1c9d45906d392592424d2000014dd10062f0d379b4438976f0f3e0d5a5f156"], 0x5) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e24, @broadcast}}) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) [ 1220.275302][T28265] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1220.298658][T28265] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1220.349137][T28265] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1220.382529][T28265] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1220.405511][T28265] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1220.507097][T28265] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1}, 0x6e) fcntl$getown(r1, 0x9) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000180)=""/21, &(0x7f0000000200)=0x15) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x14b141, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r5, 0xc004aea7, &(0x7f0000000040)) 20:40:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:52 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x0, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000a40)={0x5c, @multicast1, 0x4e24, 0x0, 'lblcr\x00', 0x8, 0x8, 0x5d}, 0x2c) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000280)=@mangle={'mangle\x00', 0x1f, 0x6, 0x728, 0x658, 0x0, 0x568, 0x568, 0x208, 0x658, 0x658, 0x658, 0x658, 0x658, 0x6, &(0x7f0000000200), {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}, [0xffffff00, 0x16d8b6f8d4ed9b8b, 0xff000000, 0xffffffff], [0xffffffff, 0x0, 0xffffffff, 0xffffff00], 'bridge_slave_1\x00', 'yam0\x00', {}, {0x80}, 0x84, 0xff, 0x3, 0x3c655313ce0e0055}, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@local, @mcast2, [0x0, 0x0, 0xffffffff, 0xff], [0xffffff00, 0xffffff00, 0x0, 0xff], 'lo\x00', 'veth1_to_bond\x00', {0x7f}, {0xff}, 0x33, 0x1f, 0x2, 0x1}, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@remote, @local, [0x0, 0x145e94ca202d8f5f, 0xff000000, 0xffffff00], [0xff, 0xff, 0x0, 0xff000000], 'bridge_slave_0\x00', 'sit0\x00', {0x101}, {}, 0x2, 0x4, 0x1, 0x1}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x4, 0x3af3d1b4, 0x3, 0x4b76, 0x20, 0x0, [@mcast1, @ipv4={[], [], @remote}, @remote, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @local}, @loopback, @dev={0xfe, 0x80, [], 0x17}, @local, @empty, @ipv4={[], [], @multicast2}, @mcast2, @rand_addr="396d2d43b8104a3d226d49f8b1bbf115", @mcast2, @mcast2, @mcast2]}}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x42}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x2d, 0x20, 0x1}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast1, @ipv6=@ipv4={[], [], @multicast2}, 0x1a, 0x10, 0x8}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x40}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x788) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r7, 0x29, 0x39, 0x0, 0x0) [ 1221.490741][T28719] XFS (loop5): Mounting V4 Filesystem [ 1221.509673][T28719] XFS (loop5): totally zeroed log [ 1221.518322][T28719] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1221.540240][T28719] XFS (loop5): Unmount and run xfs_repair [ 1221.548517][T28719] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1221.606409][T28719] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1221.689317][T28719] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r5) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) sendto$inet(r8, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000003c0)={r9, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r9, 0x4}, 0x8) 20:40:52 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x0, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1221.770049][T28719] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000180)=@abs={0x1}, 0x6e) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) setsockopt$inet6_group_source_req(r3, 0x29, 0x39, &(0x7f0000000900)={0x1, {{0xa, 0x4e24, 0x800, @local, 0xd5a}}, {{0xa, 0x4e21, 0x81, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffc0000}}}, 0x108) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000180)=@abs={0x1}, 0xfffffffffffffde6) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000280)=ANY=[], 0x0) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x248102, 0x0) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000040)={0x40, 0x6, 0x0, {0x2, 0x1, 0x17, 0x0, 'posix_acl_access^vmnet0'}}, 0x40) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000200)=ANY=[@ANYBLOB="ff0000000000000002004e20ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000002004e21e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1e000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e0000002000000000000000000000000000000b100000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22e000000100"/912], 0x390) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1221.835106][T28719] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1221.922106][T28719] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1221.980990][T28719] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:53 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, 0x0, 0x0) 20:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000180)=@abs={0x1}, 0x6e) prctl$PR_CAPBSET_READ(0x17, 0x5) sendfile(r0, r4, 0x0, 0xfffffffffffffffe) [ 1222.049408][T28719] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1222.079855][T28719] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1222.169424][T28719] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1222.220209][T28719] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1222.258585][T28719] XFS (loop5): Failed to read root inode 0xd88, error 117 20:40:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, 0x0) r6 = syz_open_pts(r5, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000100)=0x19) dup3(r6, r5, 0x0) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='moun\x83in\x85o\x00') sendfile(r0, r7, 0x0, 0x1) 20:40:53 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x27) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:53 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x0, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs={0x1}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1}, 0x6e) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8d, 0x0) getpeername$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r5, 0x0, 0x1) 20:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socket$key(0xf, 0x3, 0x2) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c002008178a8001600400004000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000180)=@abs={0x1}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1}, 0x6e) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000180)=@abs={0x1}, 0x6e) r6 = socket$unix(0x1, 0x2, 0x0) bind$unix(r6, &(0x7f0000000180)=@abs={0x1}, 0x6e) connect$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) r7 = dup3(r6, r5, 0x100000) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r9, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r10 = syz_open_procfs(r9, &(0x7f0000000340)='environ\x00') sendfile(r0, r10, 0x0, 0x1) write$P9_RREADLINK(r7, &(0x7f0000000140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) [ 1222.941826][T29266] XFS (loop5): Mounting V4 Filesystem [ 1222.967375][T29266] XFS (loop5): totally zeroed log [ 1222.978470][T29266] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1223.013636][T29266] XFS (loop5): Unmount and run xfs_repair [ 1223.034631][T29266] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1223.042553][T29266] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1223.051550][T29266] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1223.060530][T29266] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1223.069487][T29266] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1223.078410][T29266] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1223.087757][T29266] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:54 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) getsockopt$inet_udp_int(r1, 0x11, 0xc56d60a3871b3181, &(0x7f0000000140), &(0x7f0000000180)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r5, 0x0, 0x1) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f\x00\xe4\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd4de\a\xe6z\xbe\x0e\x02B\xddZ\x82[\x89\xc6\x1e@\xdc6\xf7\x86f`c\nc\v\xbb[\xa44D\xfflH\xb1x\x87\xbd\x0e\xb0\xb5\xccUz\xd2;^ 7\x96\xfc\x81\xeb3\xfa-W@nM\x1b\xcd\x13NN\xede\xdd\x0e\'\x8e\x13i\xc1\x17n\xf3\xab\xeb\xe5') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) [ 1224.272974][T29664] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:55 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/de3/dlm-moni\x96or\x00', 0x2b030c9190646a77, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000240)={0xb, &(0x7f0000000200)=""/11}) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) [ 1224.361701][T29664] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1224.465827][T29664] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1224.546812][T29664] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:55 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1224.614477][T29664] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1224.644945][T29664] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x74) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x44, 0x0, 0xe4) 20:40:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) read$rfkill(r4, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r7, 0xffffffffffffffff, 0x1}, 0x3c) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000040)={r7, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r2, 0x29, 0x39, 0x0, 0x0) 20:40:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs ', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r6, 0x7fffffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r6, 0x7, 0x0, 0x0, 0x0, @ib={0x1b, 0x5, 0x1, {"b1f0154b8fceaf69cee6209cd73e167d"}, 0x554, 0xa9, 0x401}, @in6={0xa, 0x4e24, 0x2, @rand_addr="71a6b5d37a065807f817b55325456c21", 0x8}}}, 0x118) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') socket$kcm(0x29, 0x2, 0x0) sendfile(r0, r7, 0x0, 0x1) 20:40:56 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:56 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000380)=&(0x7f0000000280)) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"/382], 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r8, 0xffffffffffffffff, 0x1}, 0x3c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000480)={'hwsim0\x00', r8}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000004c0)={@mcast1, 0x2e, r9}) 20:40:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, 0x0) r7 = syz_open_pts(r6, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000100)=0x19) dup3(r7, r6, 0x0) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) writev(r6, &(0x7f0000000180)=[{&(0x7f0000000240)="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", 0xefc}, {&(0x7f0000001240)}, {0x0}, {&(0x7f0000002240)="7f2be4bb6b40fc62483e10ca796d04694fe1d84a8cb319ebb5cfcab449a4e8bdb14d87cef8312116eb3cd1f4679539749c225f63380205f3a9208a1c80737eb144c616e582fca682c052257f588a8a604c18370e63d25af4ab6a993414f4f484a5582dd897f1fa", 0x67}, {&(0x7f0000002300)}], 0x5) ioctl$TIOCSRS485(r6, 0x542f, &(0x7f0000000140)={0x6, 0xf25, 0x8}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x19) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x20) dup3(0xffffffffffffffff, r5, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000000)) sendfile(r0, r4, 0x0, 0x80000001) 20:40:56 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)={{0x2, 0x0, @descriptor="366643239447956b"}, 0xee, [], "264ccd77dc23cff46c747930971c9eafc8045c79fb1b1104c030d5950fd6d081483437dc4051c6ba3a02e0fb9d6643e04e1010703c0bab37c5549c2bb414c6a52cc56069c2df25c67f134acc997a33ed08292cd9ee99f25e2fb26837902b1eef7f8b5dd60f5bad61a1f5848279d1eb06aa9fdcd50ac774370dcd7e79dd4f0f1a35b87f5a55071dd8cef986029108f26178261de4c36a42411211e045bae36fffff1ada3ed039277cd84e2a77e17b73e26c8798e71e0ae843850cf064e7220516bf10da38d1615995b8d42a6b6c5800658dd1284b5778344de690860d4ea289ba53d5f666024eb8a2e8e965349298"}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x1f}, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e20, 0xfffffffe, @rand_addr="c6136624c9fe86eae80b4af92ce937a4", 0xfffffff8}, {0xa, 0x4e24, 0xffffffff, @loopback, 0x20}, 0x6, [0x2, 0xffffffff, 0xb816, 0x9, 0x5, 0x8, 0x4]}, 0x5c) setsockopt$inet6_buf(r2, 0x29, 0x39, 0x0, 0x0) 20:40:57 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1226.197497][T30207] XFS (loop5): Mounting V4 Filesystem [ 1226.273301][T30207] XFS (loop5): totally zeroed log [ 1226.330345][T30207] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:40:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d090000003d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a3317e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r5, 0x0, 0x1) [ 1226.455751][T30207] XFS (loop5): Unmount and run xfs_repair [ 1226.500275][T30207] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1226.530732][T30207] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:57 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1226.605627][T30207] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) capset(&(0x7f0000000180)={0x19980330, r2}, &(0x7f0000000280)={0x2, 0x10001, 0xae, 0x7fff, 0xfffffe01, 0xfffffffc}) [ 1226.688913][T30207] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1226.751972][T30207] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1226.804733][T30207] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:40:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r0, r4, 0x0, 0x1) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x3aa0cbc9095483ea, &(0x7f0000000040)={0x0, 0x2, 0x6, 0x1, r6}) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000000)=0x1) ioctl$sock_bt_hci(r0, 0x400448e1, &(0x7f0000000140)="8c9f8905ea6fde2b9482a4280f4097e9814aada531ad86e12d5ea6511f407b167969752b9951f9aa02016ea8e4532ada0c0b307387b19206372c9c7f7b62d4aa0e7437533d3cacb70abc0c92bb417d7c6835e4a865b84b4b7bf53a5fc5343afd8b1b6a750e5728e8522c26d3db4c77d27f9fb9697835860cffd55d06ac356935a7786366fc4a53feb72d9374488cf05015cc632e760648884ff43199ae56b17082a1ff3698d5dd14332de6d8766089ea27ca8b3a0ebcc5cb4ba18e1713d661dfe45aa4664f0f0328273c30d607ceeae328a9eeed8977240a") [ 1226.879335][T30207] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1226.895305][T30207] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1226.912116][T30207] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1226.937205][T30207] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 20:40:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1226.980673][T30207] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1227.009487][T30207] XFS (loop5): Failed to read root inode 0xd88, error 117 20:40:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:40:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:58 executing program 0: r0 = socket$inet6(0xa, 0x80007, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000200)=""/4096, &(0x7f0000000180)=0x1000) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:40:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') sendfile(r0, r4, 0x0, 0x1) 20:40:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x10, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1227.820106][T30623] XFS (loop5): Mounting V4 Filesystem [ 1227.842603][T30623] XFS (loop5): totally zeroed log [ 1227.849749][T30623] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:40:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendmsg(r1, &(0x7f00000007c0)={&(0x7f0000000200)=@in6={0xa, 0x4e22, 0x6, @loopback, 0xfffffe01}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000280)="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", 0xfc}, {&(0x7f0000000180)="3642adf8009a41837f998c6a62262b6ec04d669c6516d25b50fe26dc", 0x1c}, {&(0x7f0000000800)="d456577876e34632748a96b887641ba5bfd4f9e6d2cbfced35785f406c9e8c20201d22d53e3eed0bee99526a732b5fb89375a3b3413d8d3e77b543e75884601b4ecef8da69eb368f0d7dfc2eeea4e6775b04644fd04b2788be5477778310ab46a87f488508717c09e69f7b24850cbf9d54a0ac1df3b8a1387d366eb691019b5aaa15d3664d677d83f5bd554b6bfa9cc969b58b327e21b7bf2e31a3c4b22687d6c61997f273a284b895e77b5433049a1aa074edb7fdfc10fa5a5c770b95ea90b9b83640a157e62b0527f8058a21e08461ac6cfbdc4b183b9a8020ea08ae", 0xdd}, {&(0x7f0000000480)="e5f77622f76063ac9cae78a0e84f3b402bcc54df062105e0a3ce87b8bd3682764f5cc1aa8b29fcf6ddb0f4216fcec654f736d272b208b3cab9425c8b65196d9e2effc6b0af017b13298adf56b2dabfca0d7d39297f8e268b514961b58882c3abcad2e4e5c1b497c996bf23af94834cebd87cf0fd64097287e1b5", 0x7a}, {&(0x7f0000000500)="dc21996332b3c3ba83b052a1f2c0e231b6c37b23fcffc06f8671f2eadb809b7bb9e4963b3f2d5db6b633d9692f7ea7de9a4f9a4d9e3e692c74cb90c900fc05a797c6289240a9b9449bc49355d9c8ae7fb372dc3ce45197664cd846ceb2e0ef8ccd19632ca61ea00b5c98c53d07a274e9aee2d8941df1493758c69495eddd16fbdaab201a9a3d2628e25d8b5601faa1a00c233f209241f2a81eec01862266f199281c1b663cad177e26b64d3b6b34b2988b72ff94948b773a", 0xb8}], 0x5, &(0x7f0000000640)=[{0xc0, 0x100, 0x40, "31a1de9682766264bda138dfa211416d0e5ea25313e1914f2d583cf3103fccee45b6d1d38351e4a339071b4f162cf910548202fd66fbd5f50be58273c80b00c9d1ba61ebfec5fcbc234273d921c74e58828f7d96246ceead18aa1603e7c18820e18ca9463129c88c8a140b4f0a669fe6f02b5ae71ba6bdbc1f93de37f3d1ff59b8fb6ca5fab5378b122594f5173726201448ff1464a000506dd32aea5f4d8f9740e5955e4f402fe9d62b493de9"}, {0xb8, 0x10e, 0x5, "dbf1201d986a95b94bf34d2b2ce1fc6a600bb830f68b1536068fdd6d900977b9b9cfd1afe8f1471a17b9c1b5df7529a61f8781a4704f6bd6c7b8f3146e4b377c2e0cf5027e957e24453070c2ef56b32be1d3b56faba7f0a4645a9d9cbbe29ab2fd5bea1c1ed7183338cd720b3e018b827a9f689968bf651fd3104a9675a20a09a1dabc7e6aabd7d7843a5078e0ae5a1d44c4d23979a99b7db3d285841b2e5a5061d590e1a2d8e878"}], 0x178}, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r2, 0x29, 0x39, 0x0, 0x0) [ 1227.865493][T30623] XFS (loop5): Unmount and run xfs_repair [ 1227.873669][T30623] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1227.881638][T30623] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.891816][T30623] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.901644][T30623] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.911763][T30623] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.921303][T30623] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.930664][T30623] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.939952][T30623] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.948951][T30623] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1227.958307][T30623] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 20:40:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1227.968841][T30623] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1227.991214][T30623] XFS (loop5): Failed to read root inode 0xd88, error 117 20:40:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x2d, 0x0, 0xfffffffffffffc7d) 20:40:59 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:40:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x17, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1228.508487][T30776] device nr0 entered promiscuous mode 20:40:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:40:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x226202, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000200)) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1229.105122][ T7982] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1229.127684][ T7982] XFS (loop5): Unmount and run xfs_repair [ 1229.134859][ T7982] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1229.143722][ T7982] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x2, 0x182400) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:41:00 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1229.165639][ T7982] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1229.187468][ T7982] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1229.204972][ T7982] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1229.213974][ T7982] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1229.223100][ T7982] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1229.249259][ T7982] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1229.258156][ T7982] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1229.279083][T31287] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1229.319295][T31287] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1229.328590][T31287] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:01 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:01 executing program 0: r0 = socket$inet6(0xa, 0x80005, 0x6a) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000540)=ANY=[@ANYBLOB="0000a9050000005c087b08b809b131b5ba0000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb24182c971ccf7eab67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70de20e000080be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83ec665dda4c80dbac7b8cc97b35f0dddd91f4673f7bc036f78cfc37c4b7dfd9f614bd6dea6037e156fb4948413797a"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1230.817874][T31882] XFS (loop5): Mounting V4 Filesystem [ 1230.904999][T31882] XFS (loop5): totally zeroed log [ 1230.924785][T21759] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1230.949206][T21759] XFS (loop5): Unmount and run xfs_repair [ 1230.955061][T21759] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1230.969235][T21759] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1230.978145][T21759] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000200)=""/132, &(0x7f0000000180)=0x84) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) [ 1231.009220][T21759] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1231.018319][T21759] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1231.039268][T21759] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1231.048158][T21759] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1231.076633][T21759] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1231.085798][T21759] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1231.096139][T31882] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1231.146171][T31882] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1231.193767][T31882] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 1231.204249][T31901] device nr0 entered promiscuous mode 20:41:02 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x8) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000200)="5616c29f5d89c6be1e024d5345d9b393ec58d9a12ddb5907206f9b0ef0e89c2d9068dee9fc12182f8a63abba32a65bf2093e078476a188b55f36f33f6ed5a07e8db69370c83fa624c315e8b7521e8550287e8d4d8394bae1a1235e3e741c006be10b985748013d99b97c994b493e089bb99fc69c7133303eab2a074fa85ba558785b96b320b8a10e72889ab183", 0x8d}, {&(0x7f00000002c0)="99b3768609e260a6be89326375743fc47ee0b40ed7b9f001041195da493cb182dec3d1368e1f2b8c7eb199812c6675f7da09ae6348e6361114f2a5bd3c8afbc15289567e78e573da5fa45352f23584a6eeccd4f08bf3248ac0b943d9242bf39adcff9b7bb686923d", 0x68}, {&(0x7f0000000340)="21baf28b7af9016e168bd1cb73cdee6e23236a2ef90e818c86674fc7baf1a6f7e01580baec4ebb84951996d7f46cfbfcb890a4e40ff91cd5944d4184d24fdf43d97a48591975", 0x46}], 0x3) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000180)=@abs={0x1}, 0x6e) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0xa, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377600000000000800000000000000b697a3a484066c29dabdb53547d4bf97d96c41671566f315fc4403bdb806ac504f39e6444deeff000da4a6143430d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a42269fabe3425f306968e73087c18d07c33e453d776d4f79ae6050f3353d21d4aca76487d2910edd1eed6d8fcf899b7c989c3016d21e24146b06cb342a89a51cc60f6dca3696cf3d8c01aa1110ff03000000000000996e20cada0a64fda44d40caee4eef21c182d09b1a70688c5feb684773e49f2339d26cb9385a331a6eb241ca17e394f7ea508c6e14b67c08478aad10ff1b48a6641e11eefece713a357046c1453559e07e51884724934ccadccabfa5ce2197f1fcf4a704c2df55c70d249143cb80be39cb5947e5bafb4e978d102154c6b49534e429cad9175fdb74c7c88f66817c4cff228197878ab401b55092b56d3a3935bb0949a88946e879c31f5b5bca761ea2fd221ade0cc83e"], 0x1) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x103902, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000004c0)={@loopback, @empty, @mcast1, 0x0, 0x101, 0xc, 0x0, 0x6, 0x2080100}) r4 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r4, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x4, 0x10, 0x10001, 0xff}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r5, 0x15}, &(0x7f00000002c0)=0x8) r6 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r6, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) fstat(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000380)={{{@in=@rand_addr=0xbe, @in=@remote, 0x4e21, 0x0, 0x4e20, 0x7, 0x2, 0xa0, 0x20, 0x3c, 0x0, r7}, {0x3, 0x5, 0x3ff, 0x0, 0x7d, 0x9, 0x5, 0x101}, {0x2, 0x3, 0x7}, 0x2, 0x6e6bb0, 0x1, 0x0, 0x3, 0x2}, {{@in6=@mcast2, 0x4d4, 0x3c}, 0x2, @in6=@local, 0x3500, 0x2, 0x0, 0x0, 0x5, 0x5, 0xfffffffb}}, 0xe8) 20:41:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:41:03 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x58}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) r8 = socket$packet(0x11, 0x3, 0x300) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r8, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r11, 0xffffffffffffffff, 0x1}, 0x3c) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{&(0x7f0000000800)=@nfc, 0x80, &(0x7f0000001d80)=[{&(0x7f0000000880)=""/102, 0x66}, {&(0x7f0000000900)=""/136, 0x88}, {&(0x7f00000009c0)=""/200, 0xc8}, {&(0x7f0000000ac0)=""/124, 0x7c}, {&(0x7f0000000b40)=""/164, 0xa4}, {&(0x7f0000000c00)=""/11, 0xb}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/101, 0x65}, {&(0x7f0000001cc0)=""/160, 0xa0}], 0x9, &(0x7f0000001e40)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000002e40)=@ipx, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002ec0)=""/76, 0x4c}, {&(0x7f0000002f40)=""/44, 0x2c}, {&(0x7f0000002f80)=""/4096, 0x1000}], 0x3, &(0x7f0000003fc0)=""/99, 0x63}}, {{&(0x7f0000004040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004200)=[{&(0x7f00000040c0)=""/159, 0x9f}, {&(0x7f0000004180)=""/128, 0x80}], 0x2, &(0x7f0000004240)=""/5, 0x5}, 0x3}, {{&(0x7f0000004280)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000004500)=[{&(0x7f0000004300)=""/34, 0x22}, {&(0x7f0000004340)=""/34, 0x22}, {&(0x7f0000004380)=""/166, 0xa6}, {&(0x7f0000004440)=""/180, 0xb4}], 0x4}, 0x7f}], 0x4, 0x20, &(0x7f0000004640)) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000004740)={@loopback, @broadcast, 0x0}, &(0x7f0000004780)=0xc) accept4(r3, &(0x7f0000004940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000049c0)=0x80, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000004ac0)={'team0\x00', 0x0}) r16 = socket$packet(0x11, 0x3, 0x300) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r16, &(0x7f0000000100)={0x11, 0x0, r18, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r19, 0xffffffffffffffff, 0x1}, 0x3c) r20 = socket$packet(0x11, 0x3, 0x300) r21 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r21, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r20, &(0x7f0000000100)={0x11, 0x0, r22, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r23, 0xffffffffffffffff, 0x1}, 0x3c) r24 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004c40)=""/202, 0xca}, {&(0x7f0000004d40)=""/251, 0xfb}], 0x2, &(0x7f0000004e80)=""/108, 0x6c}, 0x40000001) r26 = socket$packet(0x11, 0x3, 0x300) r27 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r27, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r26, &(0x7f0000000100)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r29, 0xffffffffffffffff, 0x1}, 0x3c) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004f40)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005040)=0xe8) r31 = socket$packet(0x11, 0x3, 0x300) r32 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r32, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r31, &(0x7f0000000100)={0x11, 0x0, r33, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r31, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r34, 0xffffffffffffffff, 0x1}, 0x3c) r35 = socket$packet(0x11, 0x3, 0x300) r36 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r36, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r35, &(0x7f0000000100)={0x11, 0x0, r37, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r35, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r38, 0xffffffffffffffff, 0x1}, 0x3c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005080)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000005180)=0xe8) r40 = socket$packet(0x11, 0x3, 0x300) r41 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r41, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r40, &(0x7f0000000100)={0x11, 0x0, r42, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r40, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r43, 0xffffffffffffffff, 0x1}, 0x3c) r44 = socket$packet(0x11, 0x3, 0x300) r45 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r45, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r44, &(0x7f0000000100)={0x11, 0x0, r46, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r44, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r47, 0xffffffffffffffff, 0x1}, 0x3c) r48 = socket$packet(0x11, 0x3, 0x300) r49 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r49, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r48, &(0x7f0000000100)={0x11, 0x0, r50, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r48, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r51, 0xffffffffffffffff, 0x1}, 0x3c) r52 = socket$packet(0x11, 0x3, 0x300) r53 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r53, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r52, &(0x7f0000000100)={0x11, 0x0, r54, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r52, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r55, 0xffffffffffffffff, 0x1}, 0x3c) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000005b40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1801000}, 0xc, &(0x7f0000005b00)={&(0x7f00000051c0)={0x924, r5, 0x200, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r7}, {0x21c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x1, 0x6, 0x4, 0x7f}, {0x83c3, 0x1f, 0x0, 0x4}, {0x8000, 0x0, 0x8e, 0xdf2}, {0x80, 0x6, 0x81, 0x97d1}, {0x7, 0x2, 0x1, 0x6406b912}, {0x40, 0x8, 0x7, 0x101}, {0x7fff, 0x6, 0x8, 0x66e}, {0x40, 0x4, 0xa5, 0x8001}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r15}, {0x128, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x280}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r23}, {0x238, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x0, 0xa, 0x1f, 0x9}, {0x0, 0x1, 0x40, 0x100}, {0x8, 0xfe, 0x29, 0x5}, {0x7, 0x85, 0x81, 0xffffffff}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7518}}}]}}, {{0x8, 0x1, r34}, {0x18c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfe6a}}, {0x8, 0x6, r38}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r39}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x3, 0x3f, 0x4}, {0x0, 0x7, 0x9, 0x733f}, {0x8000, 0x0, 0x3, 0x5}, {0x8000, 0x0, 0x7, 0x4}, {0x100, 0x1, 0x8, 0x800}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r43}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r47}, {0xb0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r51}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r55}, {0x128, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x41}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x40c0}, 0x9802) 20:41:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@rand_addr="63d15b86e046e16777ac1881fdc9e611", 0x7, 0x4, 0x0, 0x8, 0x7}, 0x20) [ 1232.978309][T32721] device nr0 entered promiscuous mode 20:41:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:04 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1233.118564][T32765] XFS (loop5): Mounting V4 Filesystem [ 1233.186265][T32765] XFS (loop5): totally zeroed log [ 1233.280015][T32765] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x300) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1233.367213][T32765] XFS (loop5): Unmount and run xfs_repair [ 1233.424672][T32765] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1233.466047][T32765] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1233.525008][T32765] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1233.576439][T32765] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1233.618611][T32765] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1233.680925][T32765] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1233.723537][T32765] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x500) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1233.773355][T32765] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1233.821188][T32765] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1233.858007][T32765] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 20:41:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:05 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) 20:41:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1234.522767][ T953] device nr0 entered promiscuous mode [ 1234.696555][ T959] XFS (loop5): Mounting V4 Filesystem [ 1234.721055][ T959] XFS (loop5): totally zeroed log [ 1234.726906][ T959] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x700) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1234.748066][ T959] XFS (loop5): Unmount and run xfs_repair [ 1234.765560][ T959] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1234.818318][ T959] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='mime_type\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000003c0)={r9, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) r10 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r10, &(0x7f00000003c0)=ANY=[], 0x27f) close(r10) r11 = socket$inet(0x2, 0x4000000805, 0x0) r12 = socket$inet_sctp(0x2, 0x5, 0x84) r13 = dup3(r11, r12, 0x0) sendto$inet(r13, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r12, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r13, 0x84, 0x7a, &(0x7f000059aff8)={r14}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r10, 0x84, 0xf, &(0x7f00000003c0)={r14, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000003c0)={r14, 0x8000}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000440)={r9, 0x5, 0x6, 0x1000, 0x4, 0x6, 0x7cbb, 0x6, {r15, @in={{0x2, 0x4e24, @empty}}, 0xd70, 0x6b5, 0x400, 0x2e19, 0x9}}, &(0x7f0000000500)=0xb0) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f00000002c0)={0x0, 0x2}) setsockopt$inet6_buf(r3, 0x29, 0x39, 0x0, 0x34d) [ 1234.948980][ T959] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1235.067076][ T959] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1235.143561][ T959] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1235.229378][ T959] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1235.252421][ T959] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1235.281851][ T959] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1235.317933][ T959] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1235.346755][ T959] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1235.395080][ T959] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1235.425599][ T959] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0xff00) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:06 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6a) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0xfa) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x400080, 0x208) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000600)={0x2, 0x0, 0x19, 0x1b, 0x10c, &(0x7f0000000200)="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"}) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 20:41:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) 20:41:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1}, 0x6e) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$TCXONC(r2, 0x540a, 0x4) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_buf(r3, 0x29, 0x39, 0x0, 0x0) 20:41:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x1000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:07 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1236.499791][ T17] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1236.538584][ T17] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.565740][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.585188][ T17] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.604983][ T17] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.624190][ T17] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.648057][ T17] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.667621][ T17] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.687053][ T17] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1236.730083][ T1537] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1236.771508][ T1537] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1236.817246][ T1537] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x3000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 20:41:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 20:41:08 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x4000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:08 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1237.686365][ T2221] device nr0 entered promiscuous mode 20:41:08 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1237.883266][ T2365] XFS (loop5): Mounting V4 Filesystem 20:41:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x5000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1237.949678][ T2365] XFS (loop5): totally zeroed log [ 1237.961094][T21759] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1237.997943][T21759] XFS (loop5): Unmount and run xfs_repair [ 1238.016434][T21759] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1238.039085][T21759] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}) [ 1238.065473][T21759] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1238.079593][T21759] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1238.123386][T21759] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1238.161931][T21759] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1238.201458][T21759] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1238.220577][T21759] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1238.229976][T21759] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1238.240002][ T2365] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 20:41:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) [ 1238.255438][ T2365] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1238.345603][ T2365] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x6000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:09 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xc, &(0x7f0000000ac0), 0x8) 20:41:09 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x7000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1238.887537][ T2682] device nr0 entered promiscuous mode 20:41:10 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1239.290483][ T3049] XFS (loop5): Mounting V4 Filesystem [ 1239.359858][ T3049] XFS (loop5): totally zeroed log 20:41:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x8000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) [ 1239.420732][ T17] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x0, 0x0) [ 1239.463541][ T17] XFS (loop5): Unmount and run xfs_repair [ 1239.490822][ T17] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1239.539356][ T17] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1239.548303][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1239.577916][ T17] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:10 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 1239.590969][ T17] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1239.602471][ T17] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1239.611590][ T17] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1239.622341][ T17] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1239.687417][ T17] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1239.720592][ T3049] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1239.767951][ T3049] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1239.786660][ T3141] device nr0 entered promiscuous mode [ 1239.851981][ T3049] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x40000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 20:41:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0xf6ffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:11 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x14000}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000440)=[{0x10, 0x0, 0x3}], 0x10}, 0x0) 20:41:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0xff000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1240.643289][ T3516] device nr0 entered promiscuous mode 20:41:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010000f000080", 0x14}], 0x1}, 0x0) 20:41:11 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) 20:41:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010000f000080", 0x14}], 0x1}, 0x0) 20:41:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0xfffffff6) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:12 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/26, 0x1a}, {&(0x7f0000000440)=""/176, 0xb0}, {&(0x7f0000000500)=""/255, 0xff}, {&(0x7f00000006c0)=""/152, 0x98}], 0x4) socket(0x0, 0x80002, 0x0) 20:41:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x1000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1241.466586][ T4088] device nr0 entered promiscuous mode 20:41:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/26, 0x1a}, {&(0x7f0000000440)=""/176, 0xb0}, {&(0x7f0000000500)=""/255, 0xff}, {&(0x7f00000006c0)=""/152, 0x98}], 0x4) socket(0x0, 0x80002, 0x0) 20:41:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:12 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, 0x0) 20:41:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x100000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:41:13 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/26, 0x1a}, {&(0x7f0000000440)=""/176, 0xb0}, {&(0x7f0000000500)=""/255, 0xff}, {&(0x7f00000006c0)=""/152, 0x98}], 0x4) socket(0x0, 0x80002, 0x0) [ 1242.310927][ T4503] XFS (loop5): Mounting V4 Filesystem [ 1242.342071][ T4503] XFS (loop5): totally zeroed log 20:41:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x200000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1242.358418][T18988] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:13 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, 0x0) [ 1242.436819][T18988] XFS (loop5): Unmount and run xfs_repair [ 1242.505036][T18988] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1242.566767][T18988] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1242.628973][T18988] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1242.647811][ T4554] device nr0 entered promiscuous mode [ 1242.669471][T18988] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:13 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/26, 0x1a}, {&(0x7f0000000440)=""/176, 0xb0}, {&(0x7f0000000500)=""/255, 0xff}, {&(0x7f00000006c0)=""/152, 0x98}], 0x4) socket(0x0, 0x80002, 0x0) [ 1242.721124][T18988] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x300000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1242.779268][T18988] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1242.827741][T18988] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1242.888823][T18988] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1242.934876][T18988] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/26, 0x1a}, {&(0x7f0000000440)=""/176, 0xb0}, {&(0x7f0000000500)=""/255, 0xff}, {&(0x7f00000006c0)=""/152, 0x98}], 0x4) [ 1242.983940][ T4503] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1243.013741][ T4503] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1243.079865][ T4503] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x400000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 20:41:14 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, 0x0) 20:41:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x500000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1243.757567][ T5201] XFS (loop5): Mounting V4 Filesystem 20:41:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1243.854909][ T5201] XFS (loop5): totally zeroed log [ 1243.865701][ T5201] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1243.879316][ T5201] XFS (loop5): Unmount and run xfs_repair [ 1243.885188][ T5201] XFS (loop5): First 128 bytes of corrupted metadata buffer: 20:41:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000100)={0x6, 'ipddp0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, 0x0, 0x0) 20:41:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 1243.979789][ T5201] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1244.061184][ T5201] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1244.138234][ T5201] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1244.219371][ T5201] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1244.236297][ T5201] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x600000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:15 executing program 4: 20:41:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1244.265408][ T5201] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1244.319365][ T5201] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1244.371761][ T5201] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1244.439342][ T5201] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1244.448555][ T5314] device nr0 entered promiscuous mode 20:41:15 executing program 4: [ 1244.524749][ T5201] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1244.588486][ T5201] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f00000002c0), &(0x7f0000000380)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7da", 0x2d, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x4, 0x4) connect$inet(r1, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:41:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x700000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) [ 1245.295728][ T5565] device nr0 entered promiscuous mode 20:41:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x800000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) 20:41:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x4000000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1245.689287][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.695126][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:41:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:16 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x40300, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={r1, 0x80000, r0}) r2 = socket$inet(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x3}, 0x4) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000200)="240000001a005f3814f9f4070009030180000a000000000000000000000084e81e3e8097", 0x33fe0) 20:41:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) 20:41:17 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10f801, 0xa8) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f00000000c0)={0x2, 0x1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)) 20:41:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 1246.437983][ T6334] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:41:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) [ 1246.542294][ T6334] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:41:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7}, 0x23) 20:41:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0xff00000000000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010000f000080", 0x14}], 0x1}, 0x0) 20:41:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0xffffffff00000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:18 executing program 4: 20:41:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc0', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:18 executing program 4: 20:41:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x20400, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r2, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) connect(0xffffffffffffff9c, &(0x7f0000000040)=@un=@abs, 0x1c) recvfrom$inet(r0, 0x0, 0x1000002b1, 0x2, 0x0, 0x800e004e5) shutdown(r1, 0x0) 20:41:18 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:19 executing program 4: poll(0x0, 0x0, 0x44) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) recvfrom$inet(r0, 0x0, 0x2b7, 0x40002, 0x0, 0x0) shutdown(r0, 0x0) [ 1248.096145][ T6834] XFS (loop5): Mounting V4 Filesystem [ 1248.142222][ T6834] XFS (loop5): totally zeroed log [ 1248.210680][T21759] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1248.227214][T21759] XFS (loop5): Unmount and run xfs_repair [ 1248.240949][T21759] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1248.257452][T21759] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1248.277925][T21759] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1248.297098][T21759] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1248.316852][T21759] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1248.337395][T21759] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) [ 1248.393532][T21759] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1248.440098][T21759] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1248.479334][T21759] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r2, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, 0x1, 0x8}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000001c0)={0x9, r4}) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r6, r5) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1248.536550][ T6834] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1248.576664][ T6834] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 20:41:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(0xffffffffffffffff, 0x0, 0x2769, 0x0, 0x0, 0x800e00506) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) msgget(0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e004fe) [ 1248.696506][ T6834] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dcw\ad\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x0f', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x7f', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:20 executing program 4: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0x44) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) recvfrom$inet(r0, 0x0, 0x2b7, 0x40002, 0x0, 0x0) shutdown(r0, 0x0) socket$inet6_udplite(0x1c, 0x2, 0x88) 20:41:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x80041, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000001c0)=0xfffffffd, &(0x7f0000000200)=0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r3, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/73, 0x49}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) shutdown(r2, 0x0) [ 1250.243120][ T7473] XFS (loop5): Mounting V4 Filesystem [ 1250.269626][ T7473] XFS (loop5): totally zeroed log [ 1250.275452][ T7473] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1250.289759][ T7473] XFS (loop5): Unmount and run xfs_repair [ 1250.295770][ T7473] XFS (loop5): First 128 bytes of corrupted metadata buffer: 20:41:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1000, @mcast2, 0x2}, {0xa, 0xe23, 0xffffffff, @mcast1, 0x10000004}, r6, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x1004, 0x0) r8 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r9 = dup2(r8, r7) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1}) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$BLKROGET(r9, 0x125e, &(0x7f0000000200)) [ 1250.335340][ T7473] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1250.404085][ T7473] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1250.441351][ T7473] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) [ 1250.462050][ T7473] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1250.482354][ T7473] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1250.501714][ T7473] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1250.545102][ T7473] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1250.593030][ T7473] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1250.609368][ T7473] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 20:41:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1250.658758][ T7473] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1250.695510][ T7473] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 20:41:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @ipv4={[], [], @broadcast}, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0x7fff}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r2, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1251.459477][ T7880] XFS (loop5): Unmount and run xfs_repair [ 1251.466151][ T7880] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1251.499366][ T7880] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1251.526288][ T7880] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1251.540596][ T7880] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) [ 1251.646590][ T7880] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1251.665941][ T7880] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:22 executing program 4: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000240)=""/146, 0x92}], 0x1, 0x0, 0xfffffffffffffec2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00546) shutdown(r0, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x58d, 0x0, 0x0, 0x800e004e5) shutdown(r1, 0x0) [ 1251.744061][ T7880] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1251.816441][ T7880] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1251.849817][ T7880] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1251.898849][ T7880] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1251.949412][ T7880] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1252.002284][ T7880] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r4 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r4, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r5) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) sendto$inet(r8, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000003c0)={r9, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)={r9, 0x1000, "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"}, &(0x7f0000000080)=0x1008) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000140)={r10, 0x7, 0x9, 0x7}, &(0x7f00000001c0)=0x10) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000041) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1252.718837][ T8241] XFS (loop5): Mounting V4 Filesystem [ 1252.738551][ T8241] XFS (loop5): totally zeroed log [ 1252.746832][ T8241] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1252.764987][ T8241] XFS (loop5): Unmount and run xfs_repair 20:41:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x40, 0x1, 0x3}}, 0x14) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1252.795538][ T8241] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1252.853141][ T8241] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1252.905111][ T8241] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:24 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) lseek(r0, 0x0, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$inet(r1, 0x0, 0xb7, 0x0, 0x0, 0x800e0044e) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/185, 0xb9}], 0x1}, 0x0) shutdown(r2, 0x0) 20:41:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r2, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000080)=""/33) [ 1252.996199][ T8241] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1253.064109][ T8241] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1253.130718][ T8241] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1253.222066][ T8241] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1253.270135][ T8241] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1253.314232][ T8241] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1253.368414][ T8241] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 20:41:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r2, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000340)=0x6, 0x4) r6 = getgid() keyctl$chown(0x4, r4, r5, r6) r7 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r7, r3) syz_init_net_socket$llc(0x1a, 0x5, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1253.413857][ T8241] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1253.494686][ T8241] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 1253.551056][ T8389] device nr0 entered promiscuous mode 20:41:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) write$capi20_data(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000fdff0000360b02000000000000008b0040cde66d184380bccfd7d2455c264d2caf05dcb0a17af6d1bd3a37352e7b7927ab15d30126a3773c17d45c8b2d21cf0e23d0fa0691faacd9ce7b8be2a7f04b6d8e2c21d2f3d9c14cc63c213abf680c9c2c9ee589ac3c6af774f46f96555e89cc680535e53ca9cb46c68ad24a0fb49cd45d58a82cee1f55cdcafd7d00ade2c555552ea54f1441a45598ffe4"], 0x9d) 20:41:25 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) lseek(r0, 0x0, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$inet(r1, 0x0, 0xb7, 0x0, 0x0, 0x800e0044e) shutdown(r2, 0x0) 20:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1254.373999][ T8714] device nr0 entered promiscuous mode 20:41:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/73, 0x49}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000240)=""/231, 0xe7}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) [ 1254.481252][ T8786] XFS (loop5): Mounting V4 Filesystem [ 1254.518442][ T8786] XFS (loop5): totally zeroed log 20:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1254.546331][T18988] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) [ 1254.630032][T18988] XFS (loop5): Unmount and run xfs_repair [ 1254.689372][T18988] XFS (loop5): First 128 bytes of corrupted metadata buffer: 20:41:25 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) [ 1254.734205][T18988] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1254.820494][T18988] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1254.895109][T18988] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1254.932027][T18988] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1254.976624][T18988] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1255.005866][T18988] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1255.050674][T18988] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1255.086659][ T8891] device nr0 entered promiscuous mode [ 1255.104089][T18988] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1255.150062][ T8786] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1255.176577][ T8786] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1255.197597][ T8786] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180), &(0x7f00000000c0)=""/13) 20:41:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/73, 0x49}, {0x0}, {0x0}], 0x3}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000240)=""/231, 0xe7}], 0x1}, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}, {0x0}], 0x2}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 20:41:26 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000100)={0x11, {{0xa, 0x4e22, 0xfffffffe, @mcast1, 0x64b}}, {{0xa, 0x4e23, 0xfffffd78, @mcast2, 0x8}}}, 0x108) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000}) setuid(0xee01) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}, &(0x7f0000000140)=0xc) getpriority(0x0, r2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r4}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r5, 0xa7}}, 0x48) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="020002004dcb2f2a0321f6f8e53c03ffc521dedc43e8aeaf516def3e41430e7a", @ANYRES32=0x0, @ANYBLOB="040003000000000008000c00", @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="100001000000000020000700"], 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r10) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r8}}, {@fowner_lt={'fowner<', r10}}, {@obj_type={'obj_type', 0x3d, 'keyring\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@uid_eq={'uid', 0x3d, r11}}, {@subj_user={'subj_user', 0x3d, 'trustedem0@\x00\x00\x00\x00\x00\x00\x00trustedkeyringcpuset\xd67\x9d\x9eE\x010,\xf6*\x17K\x10sgjd\x99\x18:jAs[\x80$\x16$\x8f\xce\x94\x0f\n\x1c\x1d$'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) chown(&(0x7f0000000040)='./file0\x00', r1, r6) r12 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r12, 0xc00c642d, &(0x7f0000000080)) [ 1255.875599][ T9200] XFS (loop5): Mounting V4 Filesystem [ 1255.968957][ T9200] XFS (loop5): totally zeroed log 20:41:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x10, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/13) [ 1255.994707][ T9200] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:27 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c04169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) sendto$inet(r5, 0x0, 0x0, 0x800, &(0x7f00006f7000)={0x2, 0x0, @multicast1}, 0x10) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000040)=0x3, 0x1000, 0x1) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="0210a62e6da98809587069d9d377371f", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x83) write$binfmt_script(r7, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e4"], 0xd9) close(r7) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) sendto$inet(r2, 0x0, 0x0, 0x4000000, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="6cb37a35fcb76bbe8e0175ea0b67c1bdbd8e54b432ad02e2692d8ab88f22b17ea088bdeb358e0d5467a8df62503b89fabf488615eaed93eb984d71df27e87d43d6e9422b9102aff8bdd479c24806231d76fafeb9f177353f98568648a0f5573db42425fb6ab0cd1addf009353ef71bcb6338f1", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r10, 0x4}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f00000003c0)={r10, @in={{0x2, 0x4e20, @local}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={r10, 0x3}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000003c0)={r6, @in={{0x2, 0x4e20, @broadcast}}, 0x100, 0x0, 0x1, 0x10000, 0x62}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000ac0)={r6, @in={{0x2, 0x4e21, @local}}, 0x7, 0x1}, &(0x7f0000000b80)=0x90) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000bc0)={r11, 0x8}, &(0x7f0000000c00)=0x8) r12 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r2, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x0, 0xfffffffa}, 0xc) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x7fffffff}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {r5, 0x40, "4ee31f", "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"}}, 0x110) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r6, r3) creat(&(0x7f0000000180)='./bus\x00', 0x0) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, &(0x7f0000000180)=@abs={0x1}, 0x6e) fadvise64(r7, 0x1, 0x7, 0x3) 20:41:27 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x44) bind$unix(r2, &(0x7f0000000180)=@abs={0x1}, 0x6e) accept$inet6(r1, &(0x7f0000000380), &(0x7f00000003c0)=0x1c) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000080)=@abs={0x1}, 0x6e) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000340)=0x8) sendto(r1, &(0x7f00000000c0)="6a73a614c7645e590fc3c806f15678d0ca5cedfe9c22bf0784e619021d84efe52402b77d473e702e9dd5d9afcfdb2e9fa2fd210f17173d44cf69876909880be298b273728677ea42b52fab222de3ea964bccdef26bad6b85308e9f5b11a9f6143f05c6226aee9ed38db5e888a901b11187715e4100"/131, 0x83, 0x8000, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @multicast2}, 0x4, 0x2, 0x1}}, 0x80) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000400)) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f00000002c0)) 20:41:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaaf2000007"], 0x48}}, 0x0) 20:41:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x11, &(0x7f0000000100)={@loopback}, 0x20) 20:41:27 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00\xa6\x94\x8e}\xd7\x8b\x8f\xfbD\x1aC,vo`\x02\xfb\x8c-\xb9G\xe5\xe1\xb6K\x87r\xf4\xa7\xd8\xb0E\x0f\"\xd4\xa0*\xaf\x0e\b\x84\x19\x17\x0e\xd3\xc1\x88\x98B5\n[\x8c\xea\xf11\xe9,\x84\x0e\x83\xa5SQYQ\xed\xaf\xd1\x9di\xfd\x1dW\x9f_\x98\xf4-z\x9e\xab\xc5\xf6\nR\x19\xd6\xba\xbc\xefu#__\xba\x04\x98\x87\xb9_$\x7f\xfa\x18\x8e\b\xce\xe6\xacw\x96\x8d\n\x19\xf9') sendfile(r1, r2, 0x0, 0x1) [ 1257.174800][ T9989] XFS (loop5): Mounting V4 Filesystem [ 1257.215891][ T9989] XFS (loop5): totally zeroed log [ 1257.222501][T10049] ERROR: Domain ' /sbin/init /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.0 proc:/self/fd/3' not defined. [ 1257.246189][ T17] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1257.265798][ T17] XFS (loop5): Unmount and run xfs_repair [ 1257.292426][ T17] XFS (loop5): First 128 bytes of corrupted metadata buffer: 20:41:28 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x81, 0x40) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000000c0)={0x28, 0x13, 0xc, 0x1f, 0x1, 0x3, 0x3, 0x134}) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000080)) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)="bd856eb01dd66bbb", 0x8}, {&(0x7f0000000140)="01a10b41dbad43293c96dff97a336d8bdfa4521cc17fdd930c1f68b078119645f832c2c54479f9e609fa1c53201030257470795350a21e", 0x37}, {&(0x7f0000000180)="77d8d7bb44294c726f3c7ca2d38d6db9476e9b50b451b03be25dd676e52689e45b935df3ec29712f4b76c87c6bb3159411", 0x31}, {&(0x7f00000001c0)="a9e3637482827170dc18fd7335a4036339b10f3be07f08b332bf09abd13d4b7a4beb40472be7a91d3ce3a6978e930cd9254798a8e423d8a24261098a9093a95380902e9532db71bd1e585694ea258839dceda8edf7b930d7220b039432d85a848b3e871d2539cf199692a8a9bd9d93d071759fe9a715605ef91d1572adedecdf9a10c7fcc1725e5a3ab8fd555f32ebc078a7a44de355db95ccdeb17398f6329af7f7c37fdf873c5542cff035b2c188a21782e059d8e6c4f16ab3ec7e57d9442fa2dacdf89a9d56ef87c86ac5d82e460405de2eaf82ffb5f5ded6e058ab71cd6198514628abb75db69432a9", 0xeb}], 0x4) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000080)=@abs={0x1}, 0x6e) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000300)) [ 1257.321806][ T17] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.340846][ T17] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.371303][ T17] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.398283][ T17] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.412824][ T17] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.422442][ T17] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.431792][ T17] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.449605][ T17] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1257.459594][ T9989] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1257.475869][ T9989] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1257.486143][ T9989] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:29 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:29 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:29 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x400000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000100)={0x2, 0x0, 0x3, 0x0, 0x6}) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0xfffffffffffffcc5, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0xa7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='\x00\x00\x00\x00\xf4\b\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000001c0)={0x8, {{0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa985}}}, 0x88) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000140)={'ifb0\x00', {0x2, 0x4e22, @local}}) ioctl$ASHMEM_GET_PIN_STATUS(r5, 0x7709, 0x0) 20:41:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00'}, 0x10) 20:41:29 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffffff}) fchdir(r1) 20:41:29 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1258.380349][T10548] XFS (loop5): Mounting V4 Filesystem 20:41:29 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/f\x01\x80\x00\x00\xff\xff\x03\x01\x00', 0x686006, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, 0x0, r1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="020002004dcb2f2a0321f6f8e53c03ffc521dedc43e8aeaf516def3e41430e7a", @ANYRES32=0x0, @ANYBLOB="040003000000000008000c00", @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="100001000000000020000700"], 0xa, 0x0) fstat(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$unix(0x1, 0x2, 0x0) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x101080, 0x0) ioctl$PIO_FONTRESET(r9, 0x4b6d, 0x0) bind$unix(r8, &(0x7f0000000080)=@abs={0x1}, 0x6e) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000380)=0xc) r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fsetxattr$system_posix_acl(r11, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r12, @ANYBLOB, @ANYBLOB="0400", @ANYRES32, @ANYBLOB="3cadc590498c0ef80819f9aa8cec", @ANYBLOB="08000400ffd20145549d24178f64563b0b597823eeb7175b751e05ed89b9ebdf98530951019d56b3ddf31e1eae59b3ff67319f9bbfbfb7734e7d6a5a0922dc71df3a0fdda47a25bd47304fac1e4b15b82085b3cff8478e6b31fa87c4e4d1b62c7d9e69dc79cda1f2265ffabbfc5bc6e429f21fda37175c22358449ed535e", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="100001000000000020000700000000"], 0xc, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x200000, &(0x7f00000003c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000}}, {@max_read={'max_read', 0x3d, 0x6}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}], [{@euid_lt={'euid<', r10}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r12}}, {@fsmagic={'fsmagic'}}]}}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)={r2, 0x1c0000, r4}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)) 20:41:29 executing program 0: pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 1258.433177][T10548] XFS (loop5): totally zeroed log [ 1258.447473][T10548] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1258.458991][T10548] XFS (loop5): Unmount and run xfs_repair 20:41:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1258.493854][T10548] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1258.522496][T10548] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.539726][T10548] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.552983][T10548] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.563571][T10548] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.581000][T10548] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.594222][T10548] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.605715][T10548] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.615773][T10548] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1258.625091][T10548] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1258.645629][T10548] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1258.715758][T10548] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:30 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:30 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:30 executing program 1: socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x2, 0x3, 0x2) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'n\xa10\x01\x00\x00\x00\x00\x00\x17@\x00', 0x20}) 20:41:30 executing program 0: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 20:41:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffde5, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) times(&(0x7f00000001c0)) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:41:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r4 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r4, 0x1, 0x0) msgsnd(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="030000000000000035b87ddb381304d8951b55e7bf412368f2a24aab2c9033562ccc8a35fe6dc6af73361a9fce174ea7611ce5b87e103f0c8f28b68fc185a2ae7bb37be99859400853bc1179a02d1d10c6b6787f46631dcee8a2e1a801fe9e9cdc569769964d7f9e9726b5c98fc1bbb1384e1324223a28d0fc6f4bf89874ae0a48e0fcc7967f18ef463f0b772c79457b0bb69970407eaf7a2d11c6ae82e16ab8f0cefc2801cc4f05bd78fae85565c05c8dad8b9c8b054744b8778b2ac2a3c40a9bf36e3c5e4f06d8bea6258ea7f6c1f43923c08e08394d8d0ecaab2366aa"], 0xde, 0x800) dup2(r3, r2) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000080)={0x3}, 0x4) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:31 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:31 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x0) 20:41:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) 20:41:31 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x0) 20:41:31 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000380)='threaded\x00', 0x20a9da14) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_acjess\x00', 0x0, 0x0, 0x0) 20:41:31 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r0, r2) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000180)=@abs={0x1}, 0x6e) fcntl$setpipe(r3, 0x407, 0x8000) openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x400, 0x0) listxattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)=""/10, 0xa) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1260.482892][T12072] XFS (loop5): Mounting V4 Filesystem 20:41:31 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1260.534208][T12072] XFS (loop5): totally zeroed log 20:41:31 executing program 1: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000000000000029a458891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x442040, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0x33) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000140)={0x3b, 0x9, 0xffffffff, 0x4}, 0x10) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) semget(0x2, 0x1, 0x150) write(r4, &(0x7f0000000000)="2400000012005f0214f9f407000904", 0xf) [ 1260.566378][T12072] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1260.607834][T12072] XFS (loop5): Unmount and run xfs_repair [ 1260.639630][T12072] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1260.647216][T12072] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1260.679814][T12072] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1260.754883][T12072] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1260.804521][T12072] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1260.834157][T12072] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1260.937485][T12072] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1260.949513][T12072] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1261.009500][T12072] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1261.019002][T12072] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1261.165081][T12072] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1261.197665][T12072] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:32 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)="0e", 0x1}, {&(0x7f0000000140)=']', 0x1}], 0x2) 20:41:32 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @remote, @multicast2}, &(0x7f00000001c0)=0xc) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x4, 0x5, 0x8, 0x500, 0xffffffffffffffff, 0x3, [0x3], r5, 0xffffffffffffffff, 0x1}, 0x3c) sendmsg$can_raw(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r5}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{}, 0x3b, 0x2, 0x0, 0x0, "3b202688bd3c9c1d6e1efd79bd728a49a22b09db45f898d339c5029e5ee7ae9940e15d2d2bb87d34c8497e3595745f31a9d5d686f88c53baad131c1937c0d6c2"}, 0x48}, 0x1, 0x0, 0x0, 0x7487c2a4451f9b76}, 0x8000) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r7, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r9 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r9, r8) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$netlink(0x10, 0x3, 0x15) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 1261.549957][ T23] audit: type=1400 audit(1575405692.529:121): avc: denied { write } for pid=12645 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 20:41:32 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$inet(0x2, 0x3, 0x29) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000001c0)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x4) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:41:32 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 20:41:32 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1261.760687][T12655] XFS (loop5): Mounting V4 Filesystem [ 1261.815685][T12655] XFS (loop5): totally zeroed log [ 1261.826793][T12655] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1261.855234][T12655] XFS (loop5): Unmount and run xfs_repair 20:41:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000003580)=""/4096, 0x1a, 0x1000, 0x8}, 0x20) [ 1261.870826][T12655] XFS (loop5): First 128 bytes of corrupted metadata buffer: 20:41:32 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1261.936508][T12879] BPF:Invalid string section [ 1261.980175][T12655] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.027294][T12655] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.058602][T12655] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.074774][T12655] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.084451][T12655] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.107551][T12655] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.123413][T12655] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.135153][T12655] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1262.144286][T12655] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1262.144335][T12655] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1262.144375][T12655] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:33 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r3, 0xf6f, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r3, 0xfe9d7519ca02de05}, 0x14}}, 0x0) 20:41:33 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:33 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r0, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:33 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1262.604424][T12993] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:41:33 executing program 1: socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000015ff8)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x2f, &(0x7f0000abaff9)={0x3, 0xfff}, 0x280) 20:41:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x718, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 1263.027176][T12997] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1263.049335][T12997] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000) 20:41:34 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:34 executing program 0: ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) tee(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaaf2000007"], 0x48}}, 0x0) 20:41:34 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x20, 0x40, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x200}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r3, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="34010000", @ANYRES16=r5, @ANYBLOB="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"], 0x134}, 0x1, 0x0, 0x0, 0x4}, 0x400c844) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r6, r4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:34 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:34 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket(0x10, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="01000000000000000000000000000000000010000000000040000000000000d4d57191db2b993556cd5505c75ab066289eeebab1593e5d7c32e4747de86c769ef69e724bed446d54df3395c4241543ffb33dff808479ab64e2a298ac2e3409d14dd41c0ac3ecb86410ebdcef89baa066577259e3b4c598057bfc37f6742c846a19c62be098b7851c4c5001d8faa67865505991"]}) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f00000003c0)=0x5, 0x82) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000380)=0x78) syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:41:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x5, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r2, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/71) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 1263.925645][T13843] XFS (loop5): Mounting V4 Filesystem [ 1263.957851][T13843] XFS (loop5): totally zeroed log [ 1263.965039][T18988] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 20:41:35 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1264.038412][T18988] XFS (loop5): Unmount and run xfs_repair [ 1264.064960][T18988] XFS (loop5): First 128 bytes of corrupted metadata buffer: 20:41:35 executing program 0: [ 1264.136660][T18988] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:41:35 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1264.206477][T18988] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1264.267518][T18988] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1264.325340][T18988] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1264.353423][T18988] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1264.376959][T18988] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1264.395301][T18988] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1264.406402][T18988] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1264.432674][T13843] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1264.471880][T13843] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1264.495401][T13843] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:35 executing program 0: 20:41:35 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:35 executing program 1: 20:41:35 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00c\x9e\x8f\xf1\x05\b\x1dA\x96\xa2\a\r+\xb7\xba\x93\xe1\x03\xa2]{\x9a\xbf\xd3\fm$\x15se\xa4~\xff\xe8\xf2\xc9\xf6\xa6\x13\x80f\x8c\xe6\xc1\xecA\x8dd\xf4\xee\x85\xefRh\xeb6\x99\x03\x8fo\xd3\xee\xab\xe4_n\x98S0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000140)={0x814, r2}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r4, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x27, 0x1, 0x1, 0x7, 0xfc, 0x1, "11251cbc2907a1a25d344ae712203f057a74f8c2476335be7f2a0cb91bcbd1188101b00c990d657bb65aa6fc86ab825e41e00697ead2fd385aeefcaba3873c", 0x2e}, 0x60, &(0x7f0000000280)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x8000}, 0x10) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r6, r5) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:36 executing program 0: 20:41:37 executing program 1: 20:41:37 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:37 executing program 1: 20:41:37 executing program 1: [ 1266.214962][T14542] XFS (loop5): Mounting V4 Filesystem [ 1266.247991][T14542] XFS (loop5): totally zeroed log 20:41:37 executing program 1: [ 1266.260578][T18988] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1266.321529][T18988] XFS (loop5): Unmount and run xfs_repair [ 1266.378811][T18988] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1266.442411][T18988] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.476017][T18988] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.539646][T18988] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.557608][T18988] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.567277][T18988] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.582629][T18988] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.593941][T18988] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.607250][T18988] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1266.636487][T14542] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1266.667370][T14542] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1266.709243][T14542] XFS (loop5): Failed to read root inode 0xd88, error 117 20:41:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 20:41:37 executing program 1: 20:41:37 executing program 0: 20:41:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e23, 0xffffffff, @remote, 0x4}, r1, 0xa7}}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev, 0x7f}]}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x1, 0x16, 0xb585, 0x100}, 0x8) dup2(r3, r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:41:37 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 20:41:37 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:38 executing program 0: 20:41:38 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 20:41:38 executing program 1: 20:41:38 executing program 1: 20:41:38 executing program 1: 20:41:38 executing program 1: [ 1267.312638][T14845] XFS (loop5): Mounting V4 Filesystem [ 1267.336667][T14845] XFS (loop5): totally zeroed log [ 1267.347657][T14845] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 1267.379544][T14845] XFS (loop5): Unmount and run xfs_repair [ 1267.391528][T14845] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1267.409345][T14845] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.418450][T14845] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.428775][T14845] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.437879][T14845] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.447341][T14845] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.456423][T14845] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.466345][T14845] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.489394][T14845] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1267.513078][T14845] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1267.571157][T14845] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1267.616491][T14845] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 1267.986155][T14845] XFS (loop5): Mounting V4 Filesystem [ 1268.036786][T14845] ================================================================== [ 1268.045357][T14845] BUG: KASAN: use-after-free in xlog_alloc_log+0x1386/0x14b0 [ 1268.052723][T14845] Read of size 8 at addr ffff8880893c9890 by task syz-executor.5/14845 [ 1268.061034][T14845] [ 1268.063348][T14845] CPU: 1 PID: 14845 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 1268.071649][T14845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.081752][T14845] Call Trace: [ 1268.085033][T14845] dump_stack+0x197/0x210 [ 1268.089353][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.094372][T14845] print_address_description.constprop.0.cold+0xd4/0x30b [ 1268.101376][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.106382][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.111397][T14845] __kasan_report.cold+0x1b/0x41 [ 1268.116327][T14845] ? kvmalloc_node+0xb0/0x100 [ 1268.121078][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.126110][T14845] kasan_report+0x12/0x20 [ 1268.130427][T14845] __asan_report_load8_noabort+0x14/0x20 [ 1268.136095][T14845] xlog_alloc_log+0x1386/0x14b0 [ 1268.141058][T14845] xfs_log_mount+0xdc/0x780 [ 1268.145610][T14845] xfs_mountfs+0xc35/0x1ca0 [ 1268.150102][T14845] ? xfs_default_resblks+0x60/0x60 [ 1268.155195][T14845] ? init_timer_key+0x13b/0x3a0 [ 1268.160030][T14845] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 1268.165387][T14845] ? xfs_filestream_get_ag+0x60/0x60 [ 1268.170657][T14845] xfs_fc_fill_super+0x84e/0x11c0 [ 1268.175680][T14845] get_tree_bdev+0x414/0x650 [ 1268.180267][T14845] ? xfs_mount_free+0x80/0x80 [ 1268.184947][T14845] xfs_fc_get_tree+0x1d/0x30 [ 1268.189520][T14845] vfs_get_tree+0x8e/0x300 [ 1268.193928][T14845] do_mount+0x135a/0x1b50 [ 1268.198252][T14845] ? copy_mount_string+0x40/0x40 [ 1268.203193][T14845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1268.209428][T14845] ? copy_mount_options+0x2e8/0x3f0 [ 1268.214609][T14845] ksys_mount+0xdb/0x150 [ 1268.218835][T14845] __x64_sys_mount+0xbe/0x150 [ 1268.223496][T14845] do_syscall_64+0xfa/0x790 [ 1268.227985][T14845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.233875][T14845] RIP: 0033:0x45d0ca [ 1268.237763][T14845] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1268.257357][T14845] RSP: 002b:00007fb436982a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1268.265774][T14845] RAX: ffffffffffffffda RBX: 00007fb436982b40 RCX: 000000000045d0ca [ 1268.273731][T14845] RDX: 00007fb436982ae0 RSI: 0000000020000140 RDI: 00007fb436982b00 [ 1268.281690][T14845] RBP: 0000000000000001 R08: 00007fb436982b40 R09: 00007fb436982ae0 [ 1268.289661][T14845] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1268.297647][T14845] R13: 00000000004cab30 R14: 00000000004e3f70 R15: 00000000ffffffff [ 1268.305622][T14845] [ 1268.307932][T14845] Allocated by task 14845: [ 1268.312336][T14845] save_stack+0x23/0x90 [ 1268.316474][T14845] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1268.322127][T14845] kasan_kmalloc+0x9/0x10 [ 1268.326434][T14845] __kmalloc+0x163/0x770 [ 1268.330657][T14845] kmem_alloc+0x15b/0x4d0 [ 1268.334973][T14845] xlog_alloc_log+0xcc3/0x14b0 [ 1268.339730][T14845] xfs_log_mount+0xdc/0x780 [ 1268.344211][T14845] xfs_mountfs+0xc35/0x1ca0 [ 1268.348692][T14845] xfs_fc_fill_super+0x84e/0x11c0 [ 1268.353695][T14845] get_tree_bdev+0x414/0x650 [ 1268.358263][T14845] xfs_fc_get_tree+0x1d/0x30 [ 1268.362831][T14845] vfs_get_tree+0x8e/0x300 [ 1268.367224][T14845] do_mount+0x135a/0x1b50 [ 1268.371531][T14845] ksys_mount+0xdb/0x150 [ 1268.375785][T14845] __x64_sys_mount+0xbe/0x150 [ 1268.380489][T14845] do_syscall_64+0xfa/0x790 [ 1268.384973][T14845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.390838][T14845] [ 1268.393150][T14845] Freed by task 14845: [ 1268.397198][T14845] save_stack+0x23/0x90 [ 1268.401330][T14845] __kasan_slab_free+0x102/0x150 [ 1268.406245][T14845] kasan_slab_free+0xe/0x10 [ 1268.410727][T14845] kfree+0x10a/0x2c0 [ 1268.414618][T14845] kvfree+0x61/0x70 [ 1268.418406][T14845] xlog_alloc_log+0xeaa/0x14b0 [ 1268.423331][T14845] xfs_log_mount+0xdc/0x780 [ 1268.427830][T14845] xfs_mountfs+0xc35/0x1ca0 [ 1268.432312][T14845] xfs_fc_fill_super+0x84e/0x11c0 [ 1268.437316][T14845] get_tree_bdev+0x414/0x650 [ 1268.441888][T14845] xfs_fc_get_tree+0x1d/0x30 [ 1268.446455][T14845] vfs_get_tree+0x8e/0x300 [ 1268.450857][T14845] do_mount+0x135a/0x1b50 [ 1268.455165][T14845] ksys_mount+0xdb/0x150 [ 1268.459393][T14845] __x64_sys_mount+0xbe/0x150 [ 1268.464063][T14845] do_syscall_64+0xfa/0x790 [ 1268.468546][T14845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.474411][T14845] [ 1268.476722][T14845] The buggy address belongs to the object at ffff8880893c9800 [ 1268.476722][T14845] which belongs to the cache kmalloc-1k of size 1024 [ 1268.490770][T14845] The buggy address is located 144 bytes inside of [ 1268.490770][T14845] 1024-byte region [ffff8880893c9800, ffff8880893c9c00) [ 1268.504115][T14845] The buggy address belongs to the page: [ 1268.509737][T14845] page:ffffea000224f240 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0xffff8880893c9000 [ 1268.520127][T14845] raw: 00fffe0000000200 ffffea0002a5bb88 ffffea00028ab7c8 ffff8880aa400c40 [ 1268.528701][T14845] raw: ffff8880893c9000 ffff8880893c9000 0000000100000001 0000000000000000 [ 1268.537274][T14845] page dumped because: kasan: bad access detected [ 1268.543667][T14845] [ 1268.545986][T14845] Memory state around the buggy address: [ 1268.551614][T14845] ffff8880893c9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1268.559668][T14845] ffff8880893c9800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1268.567731][T14845] >ffff8880893c9880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1268.575784][T14845] ^ [ 1268.580362][T14845] ffff8880893c9900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1268.588569][T14845] ffff8880893c9980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1268.596722][T14845] ================================================================== [ 1268.604766][T14845] Disabling lock debugging due to kernel taint [ 1268.614758][T14845] Kernel panic - not syncing: panic_on_warn set ... [ 1268.621369][T14845] CPU: 1 PID: 14845 Comm: syz-executor.5 Tainted: G B 5.4.0-syzkaller #0 [ 1268.631111][T14845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.641148][T14845] Call Trace: [ 1268.644421][T14845] dump_stack+0x197/0x210 [ 1268.648791][T14845] panic+0x2e3/0x75c [ 1268.652666][T14845] ? add_taint.cold+0x16/0x16 [ 1268.657323][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.662362][T14845] ? preempt_schedule+0x4b/0x60 [ 1268.667241][T14845] ? ___preempt_schedule+0x16/0x18 [ 1268.672333][T14845] ? trace_hardirqs_on+0x5e/0x240 [ 1268.677436][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.682441][T14845] end_report+0x47/0x4f [ 1268.686575][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.691596][T14845] __kasan_report.cold+0xe/0x41 [ 1268.696441][T14845] ? kvmalloc_node+0xb0/0x100 [ 1268.701142][T14845] ? xlog_alloc_log+0x1386/0x14b0 [ 1268.706151][T14845] kasan_report+0x12/0x20 [ 1268.710465][T14845] __asan_report_load8_noabort+0x14/0x20 [ 1268.716078][T14845] xlog_alloc_log+0x1386/0x14b0 [ 1268.720912][T14845] xfs_log_mount+0xdc/0x780 [ 1268.725518][T14845] xfs_mountfs+0xc35/0x1ca0 [ 1268.730111][T14845] ? xfs_default_resblks+0x60/0x60 [ 1268.735232][T14845] ? init_timer_key+0x13b/0x3a0 [ 1268.740081][T14845] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 1268.745452][T14845] ? xfs_filestream_get_ag+0x60/0x60 [ 1268.750719][T14845] xfs_fc_fill_super+0x84e/0x11c0 [ 1268.755749][T14845] get_tree_bdev+0x414/0x650 [ 1268.760368][T14845] ? xfs_mount_free+0x80/0x80 [ 1268.765027][T14845] xfs_fc_get_tree+0x1d/0x30 [ 1268.769601][T14845] vfs_get_tree+0x8e/0x300 [ 1268.774037][T14845] do_mount+0x135a/0x1b50 [ 1268.778346][T14845] ? copy_mount_string+0x40/0x40 [ 1268.783266][T14845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1268.789483][T14845] ? copy_mount_options+0x2e8/0x3f0 [ 1268.794669][T14845] ksys_mount+0xdb/0x150 [ 1268.798948][T14845] __x64_sys_mount+0xbe/0x150 [ 1268.803606][T14845] do_syscall_64+0xfa/0x790 [ 1268.808090][T14845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.813961][T14845] RIP: 0033:0x45d0ca [ 1268.817835][T14845] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1268.837416][T14845] RSP: 002b:00007fb436982a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1268.845805][T14845] RAX: ffffffffffffffda RBX: 00007fb436982b40 RCX: 000000000045d0ca [ 1268.853755][T14845] RDX: 00007fb436982ae0 RSI: 0000000020000140 RDI: 00007fb436982b00 [ 1268.861707][T14845] RBP: 0000000000000001 R08: 00007fb436982b40 R09: 00007fb436982ae0 [ 1268.869673][T14845] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1268.877623][T14845] R13: 00000000004cab30 R14: 00000000004e3f70 R15: 00000000ffffffff [ 1268.887034][T14845] Kernel Offset: disabled [ 1268.891365][T14845] Rebooting in 86400 seconds..