9e737cc61a94d1e651938db0d51820e877324481b2b5dca6fe8fa93439707ba6dd2d34037d8fc9522460ab14c2e961dbd76f9cad6fae9b8d5bdb47daf37de7b39e94f7c835d0666cc9fb1e62d15e56669c04ca3ca939bc648d3de0e421750c19812f69df0aca4e2f79b55eea4db384fb3752685ecb105406d5f39800f78c9cf8aa654d6f29ae81937861281f688f787dbf9c2e4e3acb6fc40784f79b23baa99183b6168037bd35b63b41d3eef6936800338a0856187fd8a45d848d202ae517f701b3bc19b3d8262e435868bcb5a80535a4b2c7b756ab5507fab241f931a818650548fbae2e83047433ab4d9024e295a278b62ded6def3b62897dd76e868ddc0401e67f1223a54cf5f36337592d36ef5862d6ff504ee1e508f878c455997b83d9290aa3745b235d8e545b93c6e82fb5dfeae862bf6a6a33415b5c05463e8dde64ee2830c1f2da922e1da0717fd267faf4a27e7b10ba9b5a68f92dd03328563cf8b8b7cf2e069211bc08b359ebdf4c2e826c175c962e10b95600ba4b1935702c115deb9da12b68bcdf35b09ce768779b6c3ae7cd90d0b57309f64b26a4620baf71cfbc8d09cf409f7970753b9931e7cd64f27f668981a07e257ab685d895c3e38b36bb58c3e86e030c2bed9946d058d774df59c782a5b8fb53600b3fc57c33fdfac8da9bc9bde1e0e091955547892e02e8dd0987434f1d6eb66d40085b0f64ad4648da5209a49cbe50430bd5a97922337aa922b7459c0031276fe1662c5bcf0153fd721e01a1da013c5bd905cbde2f919477f8c8aebcebd4187ff00ea8176a77613cb947d0cd81459da8d5ef080cc90e729540660bc26f3508a964d926d8a53999782f3495b59c81abfc76deb55b593eb43afd4971d3e339003ba1f7935c4ae2fbbfa01aca25e772edc6abdf0e02974bf370fa88fd4fb6e608ba8d9b9055503b3a0132a0036137123d0504adf7f2c8623b7699e926437bb51cb751595d1e3e014e846c5e7143dfcfe7ead9a0c39c1abf1addaf0a23d43c64e90fc3ee90d37d5171ea2cc8f131275c73b4981aa844f4a1bd96e718d6851db5e875993088f222cf969ef399bef074c3a9f8412f0efe6774d0d051306a797d310be4d03c009e8119353e654c6b2dc22e748fd89e1bc460f4b616c52974bcf6d1fbfe9dd24763f69496dd6396e721b16017c3bd80238abd0cf0176a96a5c008f3cf1b70346595e8cd0059045289b11f65386bd0bdf65dc7fd9c70678f83879a958a24c0dc6820ef2257bede7194a531618d5bcf68efc3122adde4126f85346938de49cbf20d9be0fc2a1ba1bc8bd7e1e503b93bfd7df85044eda87c435a9ecba01b5ad547d64e3fc11af345b7ffc85527bdd0114d28a93cb07d55e0f27c820d25c0a235f2d633c82c1d066b50259c910baaa99cab57186ed99c59a7bd99a6a43152beeb3c8ca3e476716a13f0e8272497265db1226270bf87b215f57d1b5f7eaa4e508e29b4c2d1f2bb9c391518d88c896cf98e271c596605f88f05f7e22429159e7fcf9e1a4fc26bbd80a28ee7569de7738143d56b6576df61a054b6e6048067dd57dc088f9837f355da79644b327e6936daf119bd87c95376230059fe99e246d529d1fd19b56f2bfb1e8e79216d88c6f1632a8caa87b2739a40877d2e808959d18d5a77804a4a7357872bf32d0689f6d1a438c3fec69a53917a81bd8efb0cfa8e788252d61321e9bd0ced0208e720679c82298aa32f7ce3fc183cc79bd2f155636fd7a499639c38701d70bb186404eaec7c7143f56d8fbb9d079f68afec7299c628353d00a743a8eacef9bb2ed0c8e136576cd32f45062fed0b534a3463dc314e87a70e309071fe1c1e6466c0fb2f569527f151b5cf81ecc05a966cf9554d658920d81efa89aae7e01557f73909809cda269a67e31ef18ff2a4a98903f51c865d0cc1dcd79e250d6e653a03b76ad83a601e86daf6f70d18d3a71ad3edc8738a5e1706f1a84ea0fe81eb6f7b87b0b866c6adb7edc17aba1532b037f326283f74c59f4561f0912c59510de77eaedff0a12d9f0d8e023d473a9ab22dd1b335fa591241e8ae59e7939aaca5dd1b6e9e5045665f2678b0ae10ce6a249c6099938cba9c6d6e91ab8251d4a2da89d16ccd448ea132c8b767ab9e6a1c828cf5ef719cd334b86e8edfd669a9d74ec41b3081c17642f225a32550ec314157125449fa70d44c0baf33216f06212322b35302899b9a115fc4dfb76d50ef53fd10e0f8ce10e008cb1ad7958deb9ef33baacbf98a60e80f25dc3f276963374197d2e1addd3ad35bb553271bd78562fa069581a0289c32e40e3f244d8715e71353e255632605169afe383badd8f9c8a50ccc23bc6a41d073dc3e134b1e44998d87d3419fa0d656e6864bd23d93d67795e54f1f59c40fb3061974b0d767608df9a5c4cd733f47cdf8f9979d164a309d1504266914219f3124036b9626233b09cdacffcba550d5357f385c403e1fca0bdce89dbdce126a7e1db6fa09296e05fc252a57b851f627260c0baa58f1a22ef5e14885a9fc69787e776d8c6d457a39fb24690c43164d7c4feec5450bb6574a993e3e691b4b7a621d6665964262ae5302395fea5f2603defef9e9046e4343a5c10cc4a83954fdb8fd6c7a0f10451539889682944ab86c2427103462dcd67b024e064b4301c266ce613ab898827c2207727e5d40d9f58c69eaba9b1c6fc4cf85320587caa340828c9a3e9c4ffe0b2fb5ba134b79c578f9cfdb015bfb28acf5f624bed58f0c5b204da07d80fe2ee12f13c91c4f6e5314664a5ccfc7e64c4f0c74def333b97c284b69a7ec8fd49e94235304342fe8043187bbed483af503d4d711cce52d18878c6db79bd337262dbae824fccc14ebc3d60d97300d6328eaaa45b756fa0c98f698529744b51999bc8638ecb9b80f1a38eff6b29ab0500be644e904d6a0f1746ad17682e2af154df5a9d715a4cddaaef2bec824fe7ac50741d4b472f5ecc321571c7a828031c2a06c19d1adb25389ca87bae1c0eda5daf8eef6aecf10c75aadd4dc79e2771945e7983db2ac53a518af9cfc334b0a7cd9ebb9e172432a9531a0535381168b4a8f6ac3dd15aed92f2678b361617285655963e57bf6cea8f5ce17634fd9e1df00dd8b2292003d47cc91c72ce985f39965d0a80a0676920ddfb1d10e8bb0a93e6afefc33c364e39822d5991ca23d61f4a614cb82678debf8110053946e73582fc9865e402229709f54c87eb82862b4ae122f0953b1915fcad20b344587e5c0ad497213f0521ad3b10cceda1c25d010903e5cb6aff6b6d601bdde783e6a7f27e69e1bf632098ff2c273a0cd19cba6ac021b0b558c0573d2f29d5b887d15294642b574de20afdaa0a820347b835d43a09e9bec1b921e38d79f0ad933c6f13350484b22384e5920a9e389c39db41258c9d14c5e51adef885bea820e33eb075e40b170031c5e5834848c7a8f80c657328010744eedae1772d6bbadc75fcdb11a5edeff6469a8fab57f553b9a08cfdf73f1021373aa519d945e33830fa38993a7f73e41fe53143c0de9005b208bc68af59b63c9776eb0f35896f91fed78e9af2ed79090e612d6a22d480f338ac5dc8e3e5e597bc4befb36285e3f74e3d4c9e86603322f005dfa82c56a7c0a306e58bbd24280652fce52fcc6e9c6e4c64b02579f87fd1012fb4ad349cb1a3195e2a9b6165c7011932fcb091b5ce7ff9c28497773327f39312910743a60af07891f6e7aac5953a5de6f88665731aab4b93b03d5f48865b8259891db0ae28f9e150213bdb3ce10a857088d276df75ae4fe3e7f2aa53b78f69a53fb75053d19b52100f2b33c4ccb867744f102db3a614fabe6ad40e9c2c1d314baf78fc5353a35785f1abf820804a9f8435057c9d646bfd96ee549c1eb1a47fb0be81449e7f35c22ac9fcceea264083da844967f288e41fb73ef57a170d5e3344b3bc6a221b61f98a0ea4b11a43ce9f4cb8ecd70d64dcd4afe15a6701d6f3706e7410b73601ac14c00ce5fec0f6902d71a546124d33a2ddb4eea095500ad8f616381b7e05f1c9c8dd2ed3fb9942e11eb9562d8cf41ec1a853a512d1e3626067fd341f489bab1a06e5440bc3c1154ae3284dab1d40542ba3bdea7544b4992d5b9deb1934a083e698ed560e3e684c6b27ed59f58a10ca06e16436c82e59a6c3c9e89120d2a207afba217fa15c6a746744c16696f57f7ca754d9e161c097f024064a7e4cbb3735aa5bb2f43e0e1885eadfeb6d92067543003793f504e1fca4336e246ac7101bd501a5d8d713e139327689998fb6070247a01901da3fe1d902267248c00792afba30dc2c1db11e7c1e524c0d252bead5ddf8d7f565204a9e0a3a153adc6444cd601d7d61acd89a77220d2e15884e559b6f31a64d5a466471a416755eb46524a353e5ab9a1d9df94c8da24ee1256da5ee97f0a1567820c175a251424b2479010ce7566e051c89f8b77b1eab56b196a42b93f9585283cb6bf6e4064fc2d17a01c400f8318948a8996dbbec2941cdb888d00fd04a4812d006be3a4d9adc9a8d923bb3e4640b00982ef55bbff5c69922d5a02201713fb8f7d5845d0779d6c9aa3d0070f5394bc18b2755d24e0afed1e4bfd5e3813d0cf053869474084369081d412f6f255058cfd041c2072aa4f6f7e0a785c924e58cca826798c89b1cc951df09d99e9ab0292c0e03ae91699bc159eeba38c4b4ef46012c4e4a99509dfc86217f3d79347ec8a05e40cae9aabf4a405901a9385eb46cb548f74b1ca2beec97ccedd4d1315b704928318bb228f1f9a81c58ac87729de99098b507aac0e6029e9090c04f907aaffb293b0544429efb37fb8665e9bc064f60838aceaaeb8c206768cda5d8a7ba6437818c62861177f509e3c73567deac2029def9a445b103625d4cbe799ad7ad791c0e69499f5906f1092782b0fd5b37091dd17b9055c2bd2ae5e1be81bb28e6b64a7cb9ebce4130c781e6ea912b14b223c00640c1832eebf617058543bc7b6e931a2fbcd3009bf59d5f922d0c35508a8721fd29e785d0133516c983af348445642e27ecdbff0d5d8260465f8680f274928beca6f4d297b3190e1426f0e21f67e4851045d334793b0a8f8c96c33db0c773cc815be5fe57ce2a125075d7aade368c7f968229c2a53c4da29ecf3474ea3336af2b0134b22470b1013acc12dd639fba9bae14d359f7ce0c2d88656db92686e0cf45c8463f597c7b5f7cc8e783671eb328fbfbaddcd801156ebc043cd77ff514ab9cf23079fc702c5b2d86", 0x1000}, {&(0x7f0000004e80)="79c9bd232a8646939329d0023a56693b2e26", 0x12}, {&(0x7f0000004ec0)="0c9be2a42b6a0b3469076b6153921689f7af01196ec1890d527a137b6a82b6729df11e03014183abea895d9dfacc5a73fbaeac70b9af9fd5941307c3816421edf7209b778f2bf1cee0f09a5b8b1f50f384a77b97ac58ec69a5b0a5c3fe5c04ab49e379e3262d9d46d07bb93e361eb2427842dc9684fecee90971202c58370ba5b9db78e2", 0x84}, {&(0x7f0000004f80)="bb06e88e0897430d44620fa24dc50abad53efc8f6b010ee72f4bc4df6f8d2dac776ecf25135f45b3d9939d4de6c9a0bc7390c7cdaaa1e7e9f8ae24f7f4542eadc6dfa137ef263f0f10b1f0ffa4bcd46125004538d3d3fc1f46174f9bc498e25b91d56e33ef3f3cdd27a4586af61848b3da0e8db8fc0961722ad5462d9531b960c389e6e4eb2a4fd5e2c84e39dddc26f1711d260dbbc1d71de533e23b2180d78f2ee5fa3478b3eb0e19f9af69130de509b813c9357dc7d9c5feb8adb10fcd056d196f6cc180e08fcd6b8d50278c80b7ada1", 0xd1}, {&(0x7f0000005080)="a4795c9be0484764a67c8e176d24ce975c0e7b15ef7a8b1441650c172e72e52eddff3c5e74c5a72e", 0x28}, {&(0x7f00000050c0)="8312a584e0b44787f4dfa554d11541d655ddf15673162a946df5c93222d8648f8e690ac342f49928fac32f582162cfd38d32f76043b89e4beba7ac2b5167f4ddc6ac56b02fb12fb12cbd2d275f0183e1c570038f69aabba89af40f08bf29b70d4a38d0df7cc4536a7e4809bd8be86736b19006bfa16a9f6a3e11d9c9c91bf75314c5b7712d7397b776", 0x89}, {&(0x7f0000005180)="1539c3ba1fce7cb06dc5ba6f181c2222cbb43d58eed8f48444c0e3bdd2cac10be351903ddbcb0664ef48244fde3f92f51f956e3a6c24d32642ff3bea044b444c40dadfcf40c382ab9be81abd13d9066ff552f68ceb17a8369d7c378fe6928f4960d368069c69e8384901dec4edb3e1988f1683e9b802b8cf8229a959af5a227217e7824d5f1826ac4861186975ecff41cc614033a535ce8cb2fe367a87f29c45cacf3051f83319b08640509ed444a6a83c488f6c1a5eaeb19f79d6518e64e989c1d665c3c7cf1e76dc87e93b56", 0xcd}], 0x7, 0x0) getresgid(&(0x7f0000005300)=0x0, &(0x7f0000005340), &(0x7f0000005380)) r6 = getgid() stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000005480), &(0x7f00000054c0)=0x0, &(0x7f0000005500)) setgroups(0x4, &(0x7f0000005540)=[r5, r6, r7, r8]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000005580)={0x0, 0x6, 0x1, [0x2080]}, &(0x7f00000055c0)=0xa) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000005600)={r9, @in6={{0xa, 0x4e23, 0x10000, @loopback, 0x45}}}, 0x84) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000056c0)=0x8001) semctl$SEM_INFO(r3, 0x0, 0x13, &(0x7f0000005700)=""/52) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000005740)={0x1, 0x0, 0x101, 0x4, {0x7, 0x91, 0x7fff, 0x85e}}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000005780)={r9, 0x1, 0x8001, 0x4}, &(0x7f00000057c0)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000005800)={r9, @in={{0x2, 0x4e21, @empty}}}, &(0x7f00000058c0)=0x84) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000005a00)={0xed, &(0x7f0000005900)="4c7654e4a5cdfdc9222f4afbeda346a680a3e4724c9af9f0fc018ea47182611c55bc364b80863edd4bca7d454c2de1848dd95e5b3b9ebf8fd2cc4b7e95d3d74ece9af1aa833a4b0da7a64538b2e57cd670dba3f398c314514c6117e38bf2e8ccebdffeba03d7f599a7a7aba62bb30f0f7a172d51354f0cc2fff3f58a2a67c0f18d8276d51c271f3625581dfb1f87c23be65365d54bca2b6fdd81df1bd668b075f10eee883406ba9cb447ae61b42db3ea7a20d047e604bfdb72327ac4d903047da80f7369bc4164eb199ad4544cf9b1a7554bb2ea59aa196fe75ed16d8b0ca8535cc50638f7658fe7c523ffdebd"}) [ 101.953694][T10035] chnl_net:caif_netlink_parms(): no params data found [ 102.045467][T10035] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.054281][T10035] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.063454][T10035] device bridge_slave_0 entered promiscuous mode [ 102.072390][T10035] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.080199][T10035] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.088942][T10035] device bridge_slave_1 entered promiscuous mode [ 102.124239][T10038] IPVS: ftp: loaded support on port[0] = 21 [ 102.133468][T10035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 102.163135][T10035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:27:10 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) r7 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f0000001ac0)=0x92f2) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000001b00)) fcntl$setown(r8, 0x8, r5) [ 102.223789][T10035] team0: Port device team_slave_0 added [ 102.231631][T10035] team0: Port device team_slave_1 added [ 102.376864][T10035] device hsr_slave_0 entered promiscuous mode 23:27:11 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000040)={0x7, 0x6}) sendmsg$nl_crypto(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@getstat={0xe0, 0x15, 0x400, 0x70bd27, 0x25dfdbfe, {{'rfc4106-gcm-aesni\x00'}, [], [], 0x2000, 0x2000}, ["", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x4011}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) connect$can_bcm(r0, &(0x7f0000000380)={0x1d, r2}, 0x10) clock_gettime(0x7, &(0x7f00000003c0)) sendmsg$can_raw(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x1d, r2}, 0x10, &(0x7f0000000480)={&(0x7f0000000440)=@can={{0x2, 0x100000000, 0x6, 0x2}, 0x6, 0x1, 0x0, 0x0, "64655fbc49ef3d0c"}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000500)=""/238) r3 = accept$inet(r0, &(0x7f0000000600), &(0x7f0000000640)=0x10) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000680)=0xffff) getsockname$inet(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x10) getpeername$tipc(r0, &(0x7f0000000740), &(0x7f0000000780)=0x10) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f00000007c0)=0x3) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000800)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000840)={0x91, 0x3f, 0xf, 0x80000001, 0x1b, 0x7f, 0x8001, 0x100, 0x0, 0x4ad, 0x7, 0x4}) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000880)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000008c0)) mkdirat$cgroup(r0, &(0x7f0000000900)='syz0\x00', 0x1ff) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000940)=0x7fff, 0x4) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000980)={{0xffffffffffffffff, 0x2, 0x8, 0x1, 0xffff}, 0x2618, 0x5, 'id1\x00', 'timer1\x00', 0x0, 0x3c649004, 0x3ff, 0xa7, 0x48}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000b00)={0x9, &(0x7f0000000a80)=[{0x0, 0x7b, 0x1ff, 0x8}, {0x4, 0xfff, 0x8, 0x8000}, {0x57ec, 0x200, 0x101, 0xf9}, {0xd80, 0x7f, 0x1, 0x401}, {0x8001, 0x3f, 0x80000000, 0xcf}, {0x8, 0x9, 0x1, 0x7}, {0x1, 0x101, 0x9, 0x7}, {0x81, 0x1, 0x8001, 0xae1}, {0x7, 0xffffffffffffff81, 0x40, 0x6}]}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000b40)={0x50, 0x0, 0x4, {0x7, 0x1f, 0x8000000000000, 0x2000000, 0x81, 0xa8b, 0x8, 0xffff}}, 0x50) fcntl$addseals(r0, 0x409, 0x2) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000bc0)=""/50) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000c00)={'nat\x00', 0xa4, "2efdfda8e35b788c3b43590369a68a8a7a1620d7ff4ceff9f9d413ab1d649c59e239b5f5b1fc1144743874a82b7335fdd5aaf1113ea413d5fc987b6fa7129586706c5e4b9e4cd909c6cd1ae0f264bbbe16307abfb9a341c49dd34b0b4f6271513f103f642b18554557d43db378508170870c692c0ccc4f6eb31a3ccd217fc8c86a98627c2b9c5628e99e12471578c8410621926180db340849bf93b32e1935b8368d5ab2"}, &(0x7f0000000d00)=0xc8) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000d40)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x40) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000d80)) [ 102.424051][T10035] device hsr_slave_1 entered promiscuous mode [ 102.556526][T10035] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.563818][T10035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.571758][T10035] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.578938][T10035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.593822][T10038] chnl_net:caif_netlink_parms(): no params data found [ 102.599404][T10041] IPVS: ftp: loaded support on port[0] = 21 [ 102.722568][T10038] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.729779][T10038] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.738277][T10038] device bridge_slave_0 entered promiscuous mode [ 102.757998][T10038] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.765366][T10038] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.774021][T10038] device bridge_slave_1 entered promiscuous mode [ 102.791730][T10043] IPVS: ftp: loaded support on port[0] = 21 [ 102.845388][T10038] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 102.861315][T10038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:27:11 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.redirect\x00', &(0x7f00000008c0)='./file0\x00', 0x8, 0x3) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000900)=0x1, 0x4) get_mempolicy(&(0x7f0000000940), &(0x7f0000000980), 0xffffffffffffffda, &(0x7f0000ffc000/0x4000)=nil, 0x3) openat$ashmem(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ashmem\x00', 0x2000, 0x0) [ 102.938511][T10035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.949677][T10038] team0: Port device team_slave_0 added [ 102.974710][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.996009][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.014978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 103.056678][T10038] team0: Port device team_slave_1 added [ 103.084103][T10041] chnl_net:caif_netlink_parms(): no params data found [ 103.109249][T10035] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.138144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.148775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:27:11 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000040)=""/226, &(0x7f0000000140)=0xe2) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x8, 0x7, 0x8, 0xfff, 0xd4, 0x3, 0x2, {0x0, @in6={{0xa, 0x4e21, 0x2, @mcast2, 0xffffffff80000000}}, 0x4, 0x400, 0x0, 0x5, 0x9}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x3, 0x100000001, 0x8200, 0x6, 0x20, 0x4, 0x4, 0x7ff, r2}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000300)=0x32c, 0x4) bind$pptp(r0, &(0x7f0000000340)={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1e) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x8}, 0x8) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000400)=0x63, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000440)={{0x9, 0x0, 0x8001, 0x9c3, 'syz1\x00'}, 0x1, [0x6, 0x3, 0x1, 0x6, 0x3, 0x4, 0x37b, 0x6, 0x5d, 0x7, 0x6, 0x5a, 0x1f, 0x80, 0xffffffff, 0x8000, 0x100000001, 0x2, 0x4cea, 0x166, 0x8, 0x10000, 0x80000001, 0x7fffffff, 0xfffffffffffffffe, 0x5e63, 0x3, 0xffff, 0x1ff, 0x4, 0x0, 0x5, 0xb5, 0x7, 0x80000000, 0x200, 0x7, 0x1, 0x8000, 0x2, 0xc2e, 0x9, 0x571, 0x5, 0x9, 0xffffffffffffffff, 0x42, 0x0, 0x8001, 0xfa, 0x93, 0x81, 0x6, 0x6, 0x1, 0x0, 0x100000000, 0x6, 0x3, 0x37a1, 0x3f, 0x7, 0x2, 0x8, 0x200, 0x1, 0x5, 0x100, 0x0, 0xfffffffffffff801, 0xffffffff, 0x10001, 0x0, 0x1, 0x7fff, 0x200, 0x7f, 0x8, 0x81, 0x7, 0x2, 0x1, 0x3, 0x426d6f70, 0x7, 0x2, 0x1417, 0x7, 0x1, 0x3ff, 0x7, 0x0, 0x6, 0x7ff, 0x4, 0x0, 0x1000, 0x0, 0xfffffffffffffffa, 0x3, 0xfffffffffffffffa, 0x7, 0xfc6, 0x2, 0x7, 0x8, 0x3ff, 0x9496, 0x5, 0x4, 0x0, 0x4bd, 0xa1, 0x20, 0x99, 0x10000, 0x7ff, 0x9b, 0x40, 0x6, 0x0, 0x8, 0x6fc9, 0x3, 0x2, 0x8, 0x58, 0x80]}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000940)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000980)=0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000009c0)={r0, r1, 0x10000}) perf_event_open(&(0x7f0000000a00)={0x4, 0x70, 0x3, 0x5, 0x5, 0x400, 0x0, 0xffffffffffffffff, 0x15008, 0x4, 0x9, 0x7, 0x8, 0x5, 0x9, 0x8, 0xfa, 0x0, 0xffffffffffffffe1, 0xffffffffffffff7f, 0x2, 0xfffffffffffffffa, 0x9, 0x0, 0x4, 0x4, 0x40, 0x0, 0x2, 0x100000001, 0x2, 0xfff, 0x6, 0x7ff, 0x8000, 0x1ff, 0x81, 0x7, 0x0, 0x100, 0x2, @perf_config_ext={0x0, 0x9}, 0x8040, 0x7b5a3efe, 0x8001, 0x7, 0x100000000, 0x6, 0x6a2}, 0xffffffffffffffff, 0x5, r3, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl(r0, 0x200, &(0x7f0000000b00)="e2f7e3135565b75bd17f60e2fb9fecb6aae0") ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000b40)={0x6, r3}) setxattr$trusted_overlay_origin(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)='trusted.overlay.origin\x00', &(0x7f0000000c00)='y\x00', 0x2, 0x3) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000c40), &(0x7f0000000c80)=0x40) prctl$PR_SET_DUMPABLE(0x4, 0x3) r6 = msgget(0x2, 0x48) msgctl$IPC_STAT(r6, 0x2, &(0x7f0000000cc0)=""/4096) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000001d80)={0x3, @bcast, r7}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000029c0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000002ac0)=0xe8) sendmsg$inet6(r0, &(0x7f0000002d40)={&(0x7f0000001dc0)={0xa, 0x4e22, 0x4116, @local, 0x5}, 0x1c, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="e3f3219549c11ef392b4022e930ca553ca9e91288cd3b59cee7fbcda7f188bf08205425fa80dc4f860596a70ddb06a2c36509dcfbcd5e5cbb16332c128e7335246742a23e710958a711187069f52d218923ac29acaee09bfe2d0cf3f2eb323addc1212622250763f2e8bcfe7ed", 0x6d}, {&(0x7f0000001e80)="e9b06e1a74ced23df7d7789dbb509a0f", 0x10}, {&(0x7f0000001ec0)="aa99689b75bfdf451a5bfaf3097ff23d50265ba87ae8b4224589fa368aa0522dd7acfcb8c7004076f105992cd4bb51efee36bed26e09ac462b99f9715b7bb7e43c2dff83f693974b3af85025cac0d2", 0x4f}, {&(0x7f0000001f40)="5e2a0044882f4676d6db1ff4bcd0e130932dbd640aa4cca9", 0x18}, {&(0x7f0000001f80)="fc", 0x1}], 0x5, &(0x7f0000002b00)=[@hopopts_2292={{0x130, 0x29, 0x36, {0xff, 0x23, [], [@padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x38, {0x100000000, 0xc, 0x6, 0x93, [0x101, 0x3, 0x750, 0x7, 0x9d55, 0x4]}}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x1f}, @pad1, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x7fff, 0xb9, "f0c0bc1085d08f4f9831e4b3e01bc5ae2c6326cf06fb99e54d47d25403d2548a1ee964e722fdeb56b7dc4764c5b1a3d9a711b2cffc11b8c3597e1eb4d8db170cdd7a0f2d80ad75c5d9c339230eab2c1f43de0e38374fe6a1f94c6f67b3132bb33425bbc0521d7f5b12f651e795cbc071fcd0ba6254be2d5f37016341a1a37c94f0ed163e30811ab6e939e96092abe75c365875a033be2ca8818bab9e2bcb07aaa41863842fe0f7a89359ec9dcd04e782417dc00b7cc6f0a789"}]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x2f, 0x0, [], [@pad1]}}}, @rthdr={{0x48, 0x29, 0x39, {0x0, 0x6, 0x2, 0x4, 0x0, [@mcast1, @remote, @remote]}}}, @dstopts={{0x20, 0x29, 0x37, {0x3f, 0x1, [], [@ra={0x5, 0x2, 0xff}, @ra={0x5, 0x2, 0x9}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x6bf2}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x14}, r8}}}], 0x210}, 0x40000c0) bind$xdp(r3, &(0x7f0000002d80)={0x2c, 0x2, r8, 0x1d, r3}, 0x10) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000002dc0)={0x23}) [ 103.226566][T10038] device hsr_slave_0 entered promiscuous mode [ 103.273193][T10038] device hsr_slave_1 entered promiscuous mode [ 103.332599][T10038] debugfs: Directory 'hsr0' with parent '/' already present! [ 103.341048][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.351794][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.360487][ T2822] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.367594][ T2822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.377221][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.385979][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.394557][ T2822] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.401629][ T2822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.409317][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 103.487088][T10041] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.496643][T10041] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.504598][T10041] device bridge_slave_0 entered promiscuous mode [ 103.511913][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 103.530160][T10048] IPVS: ftp: loaded support on port[0] = 21 [ 103.530332][T10050] IPVS: ftp: loaded support on port[0] = 21 [ 103.558049][T10041] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.565779][T10041] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.575481][T10041] device bridge_slave_1 entered promiscuous mode [ 103.590518][T10043] chnl_net:caif_netlink_parms(): no params data found [ 103.606317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 103.615404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.624264][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 103.633453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.641977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 103.671247][T10041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.719891][T10041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.769590][T10043] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.776955][T10043] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.785394][T10043] device bridge_slave_0 entered promiscuous mode [ 103.793219][T10043] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.800315][T10043] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.808080][T10043] device bridge_slave_1 entered promiscuous mode [ 103.816329][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 103.825559][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.842228][T10041] team0: Port device team_slave_0 added [ 103.853585][T10041] team0: Port device team_slave_1 added [ 103.896144][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.904890][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.965081][T10041] device hsr_slave_0 entered promiscuous mode [ 104.002754][T10041] device hsr_slave_1 entered promiscuous mode [ 104.052831][T10041] debugfs: Directory 'hsr0' with parent '/' already present! [ 104.063353][T10043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.077378][T10035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 104.100329][T10043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.187222][T10043] team0: Port device team_slave_0 added [ 104.199450][T10043] team0: Port device team_slave_1 added [ 104.257697][T10048] chnl_net:caif_netlink_parms(): no params data found [ 104.277063][T10035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 104.344598][T10043] device hsr_slave_0 entered promiscuous mode [ 104.393468][T10043] device hsr_slave_1 entered promiscuous mode [ 104.452581][T10043] debugfs: Directory 'hsr0' with parent '/' already present! [ 104.550475][T10038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.566007][ T26] audit: type=1400 audit(1563233233.240:38): avc: denied { associate } for pid=10035 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 104.585538][T10050] chnl_net:caif_netlink_parms(): no params data found [ 104.629167][T10048] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.637680][T10048] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.646361][T10048] device bridge_slave_0 entered promiscuous mode [ 104.667269][T10038] 8021q: adding VLAN 0 to HW filter on device team0 [ 104.682755][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.701073][ T2822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.710016][T10048] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.725810][T10048] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.729379][ T26] audit: type=1400 audit(1563233233.400:39): avc: denied { create } for pid=10059 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 104.777899][T10048] device bridge_slave_1 entered promiscuous mode [ 104.782678][ T26] audit: type=1400 audit(1563233233.430:40): avc: denied { write } for pid=10059 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:27:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, 0x0) [ 104.818612][ T26] audit: type=1400 audit(1563233233.430:41): avc: denied { read } for pid=10059 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 104.852192][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.870733][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 23:27:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/246) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r2 = dup(r1) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x37c, 0x0, 0x0, 0x1aa6cb9e88f7817e) [ 104.899316][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.906504][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.922078][T10041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.986131][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.004045][ C1] hrtimer: interrupt took 32946 ns [ 105.006129][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.032074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.047565][ T26] audit: type=1326 audit(1563233233.720:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c65a code=0x50000 [ 105.048290][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.080390][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.095574][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.108325][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.112352][ T26] audit: type=1326 audit(1563233233.750:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459819 code=0x50000 [ 105.121670][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.157331][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.204457][ T26] audit: type=1326 audit(1563233233.750:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459819 code=0x50000 [ 105.230220][ T26] audit: type=1326 audit(1563233233.750:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459819 code=0x50000 [ 105.230251][ T26] audit: type=1326 audit(1563233233.770:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c65a code=0x50000 [ 105.287886][T10048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.306014][T10041] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.313308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.322976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.331924][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.343573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.352022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.361412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.370444][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.379642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.387995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.404712][T10050] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.411809][T10050] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.421048][T10050] device bridge_slave_0 entered promiscuous mode [ 105.431249][T10048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.485085][T10050] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.492187][T10050] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.505657][T10050] device bridge_slave_1 entered promiscuous mode [ 105.514898][T10038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:27:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/246) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r2 = dup(r1) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x37c, 0x0, 0x0, 0x1aa6cb9e88f7817e) [ 105.549215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.567268][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.577075][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.584208][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.631781][T10038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.668176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.677266][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.686376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.695566][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.702737][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.711398][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.720570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.729652][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.738711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.748003][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.757777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.775581][T10048] team0: Port device team_slave_0 added [ 105.784171][T10048] team0: Port device team_slave_1 added [ 105.806517][T10043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.823622][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.845168][T10050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.878256][T10041] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 105.897205][T10041] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 105.941803][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.950918][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.967143][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.978578][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.991268][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.009420][T10050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:27:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/246) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r2 = dup(r1) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x37c, 0x0, 0x0, 0x1aa6cb9e88f7817e) [ 106.085803][T10048] device hsr_slave_0 entered promiscuous mode [ 106.124534][T10048] device hsr_slave_1 entered promiscuous mode [ 106.172861][T10048] debugfs: Directory 'hsr0' with parent '/' already present! [ 106.198679][T10041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.255507][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.275472][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.300796][T10043] 8021q: adding VLAN 0 to HW filter on device team0 23:27:15 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/246) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r2 = dup(r1) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x37c, 0x0, 0x0, 0x1aa6cb9e88f7817e) [ 106.400151][T10050] team0: Port device team_slave_0 added [ 106.422657][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.431448][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.442243][ T3506] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.449381][ T3506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.465332][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.478945][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.489864][ T3506] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.497012][ T3506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.540139][T10050] team0: Port device team_slave_1 added [ 106.572264][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.597958][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 23:27:15 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200b8273c1c000000000003000000000300000004000000000000000000"], &(0x7f0000000180)=""/161, 0x32, 0xa1, 0x80000000000001}, 0x20) 23:27:15 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x5, 0x1, 0x8000, 0x0, 0x0, 0x7, 0x1010, 0xa, 0x3, 0x1, 0x81, 0x6, 0x3157, 0x9, 0x7fffffff, 0x7b8, 0x989, 0x996, 0x5, 0x6c, 0x2, 0x8, 0x7, 0x1, 0x3ff, 0x80000000, 0x5, 0xffffffff, 0x5027, 0x4, 0x7, 0x7fff, 0x2, 0x7, 0x5, 0x0, 0x0, 0xb5, 0x4, @perf_config_ext={0x2, 0xabf}, 0x20, 0xff, 0x1000, 0x7, 0x7, 0x1, 0x5}, r0, 0xa, r1, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00003f3000/0x2000)=nil, 0x2000, 0x1) [ 106.639905][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.677560][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.711559][ T26] kauditd_printk_skb: 300 callbacks suppressed [ 106.711574][ T26] audit: type=1400 audit(1563233235.380:347): avc: denied { map } for pid=10094 comm="syz-executor.2" path="/dev/null" dev="devtmpfs" ino=16190 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:null_device_t:s0 tclass=chr_file permissive=1 [ 106.750762][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 23:27:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x15, 0x81}]}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x7fffc, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) getuid() ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x10001, 0x5d, 0x80, 0x0, 0xff}, &(0x7f0000000180)=0x14) [ 106.794745][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.909639][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.924621][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.945493][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.955538][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 23:27:15 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) r7 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f0000001ac0)=0x92f2) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000001b00)) fcntl$setown(r8, 0x8, r5) [ 106.991599][T10048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.045772][T10050] device hsr_slave_0 entered promiscuous mode [ 107.092942][T10050] device hsr_slave_1 entered promiscuous mode [ 107.132820][T10050] debugfs: Directory 'hsr0' with parent '/' already present! [ 107.146077][T10043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.158135][T10043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.188536][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.205237][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.240840][T10048] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.251291][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.259643][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.293744][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.306352][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.315088][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.322527][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.331251][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.340303][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.349301][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.356465][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.364723][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.373631][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.382173][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.391063][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.399657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.408587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.419146][T10043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.441930][T10048] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 107.453292][T10048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.480393][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.488903][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.499868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.508560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.517509][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.526624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.535751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.566293][T10048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.634558][T10050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.655433][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.667564][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.680050][T10050] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.695182][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.710738][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.722131][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.729342][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.750095][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.759182][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.769009][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.778209][T10046] bridge0: port 2(bridge_slave_1) entered blocking state 23:27:16 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x800, 0x400) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) geteuid() geteuid() gettid() syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000140)='./file0/file0\x00', 0xc5, 0x6, &(0x7f0000001580)=[{&(0x7f0000000200)="de711cfecee4e6311eda21638583f777d71e12c94c4103a84f428e3ff3abec2f0a50abf5eba9474218cb2bc4618ad87ca25e9f6b174b7608c4788c470f64d267998ba86648e74d65ead8d0d825c8c3b48bdd8469cebf9389d8f8b14bf69287900ec2cb20880e34f6f428dbaa730afa1a1778faf1ed72badf64d9f7d74fc97e53de", 0x81, 0xa6}, {&(0x7f00000002c0)="f94579e0fdc220b52e527be9f21e4a93b7fa43bbc8195d3607eab1e0c64e5adf37279196714637be64081cd09b1360376a50fa71922bf2", 0x37, 0x400}, {&(0x7f0000000300)="df60176ac6b45d9508685eefb1fa51", 0xf, 0x34}, {&(0x7f0000000340)="77a004798e67a1ab1c4a93a22be724c74ac3fbe5d4ac70b8db71a4bbde8fd4c07de39a6d4836a57fae86e03b0702a14231a22976a6aaf4aa3cd28f20f62730f37e961f74acb06da099d7775717bad05dee19b33a40f7c8a6a74a206b0e5a9ec8d515bf9efb551af2842ba255d583cf2bed2b3848124376c7df28896cabdc54f872425631f27dd99fb3942fa8756472ade7ba0f91b362f4f2d0bf06eb97355e717c639878fd34f584b0f6233ec27727f16d73e648a0affe102daa428b2572fb945e59c5b1e6c8c93ba4f69f5790c5b1d9a6affc466636bab82bd6746ba03814529f576dd88fb143dbf624f33b362fff3e1379632662e63716", 0xf8, 0x7fff}, {&(0x7f0000000500)="80b9e05f3806ba3748d5e8d108a00cc69820cc41f900032847e6eaca1585370f5f3cc326dacd03195b4dd8c4274e6774abfdd0267fc30031050196afefdcb11e098d9c967ec7db6d", 0x48, 0x1}, {&(0x7f0000000580)="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", 0x1000, 0x6}], 0x2300000, &(0x7f0000000480)={[{@extent_cache='extent_cache'}], [{@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@subj_type={'subj_type', 0x3d, '}GPL}'}}]}) fstat(0xffffffffffffffff, 0x0) getpid() getresgid(0x0, 0x0, 0x0) [ 107.785373][T10046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.812854][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.821894][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.854155][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.863789][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.872810][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.881781][T10046] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.916856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.931667][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.961200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.973324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.981814][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.005974][T10137] QAT: Invalid ioctl [ 108.012825][T10050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.043655][T10137] QAT: Invalid ioctl [ 108.070819][T10137] QAT: Invalid ioctl [ 108.076384][T10137] QAT: Invalid ioctl [ 108.095009][T10050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.102141][T10137] QAT: Invalid ioctl [ 108.111493][T10137] QAT: Invalid ioctl 23:27:16 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.redirect\x00', &(0x7f00000008c0)='./file0\x00', 0x8, 0x3) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000900)=0x1, 0x4) get_mempolicy(&(0x7f0000000940), &(0x7f0000000980), 0xffffffffffffffda, &(0x7f0000ffc000/0x4000)=nil, 0x3) openat$ashmem(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ashmem\x00', 0x2000, 0x0) [ 108.127517][T10137] QAT: Invalid ioctl [ 108.131745][T10140] QAT: Invalid ioctl [ 108.140063][T10143] QAT: Invalid ioctl [ 108.144578][T10137] QAT: Invalid ioctl [ 108.149349][T10140] QAT: Invalid ioctl [ 108.156359][T10143] QAT: Invalid ioctl [ 108.279508][T10151] QAT: Invalid ioctl [ 108.292566][ T26] audit: type=1400 audit(1563233236.960:348): avc: denied { create } for pid=10148 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 108.316191][T10151] QAT: Invalid ioctl 23:27:17 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$peekuser(0x3, r0, 0x40) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaa09b531a5fe87294f86dd60110c1100300600fe80c0b62d00000000000000004840130000ff46ed01010000000000000079857337000a010090780003000060cb155d00001b00ff02000000000000000000400000000000000000"], 0x0) 23:27:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000280)=0x19b1, 0x4) 23:27:17 executing program 0: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x8, 0x9e, 0x36e}, &(0x7f0000000240)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x4}}, 0x10) recvfrom$llc(r0, &(0x7f0000000100)=""/27, 0x1b, 0x22, &(0x7f0000000140)={0x1a, 0xfffe, 0x8, 0xeb, 0x7ff, 0x4, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd11, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f00000003c0)=0x2) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 23:27:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) r7 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f0000001ac0)=0x92f2) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000001b00)) fcntl$setown(r8, 0x8, r5) 23:27:17 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x800, 0x400) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) geteuid() geteuid() gettid() syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000140)='./file0/file0\x00', 0xc5, 0x6, &(0x7f0000001580)=[{&(0x7f0000000200)="de711cfecee4e6311eda21638583f777d71e12c94c4103a84f428e3ff3abec2f0a50abf5eba9474218cb2bc4618ad87ca25e9f6b174b7608c4788c470f64d267998ba86648e74d65ead8d0d825c8c3b48bdd8469cebf9389d8f8b14bf69287900ec2cb20880e34f6f428dbaa730afa1a1778faf1ed72badf64d9f7d74fc97e53de", 0x81, 0xa6}, {&(0x7f00000002c0)="f94579e0fdc220b52e527be9f21e4a93b7fa43bbc8195d3607eab1e0c64e5adf37279196714637be64081cd09b1360376a50fa71922bf2", 0x37, 0x400}, {&(0x7f0000000300)="df60176ac6b45d9508685eefb1fa51", 0xf, 0x34}, {&(0x7f0000000340)="77a004798e67a1ab1c4a93a22be724c74ac3fbe5d4ac70b8db71a4bbde8fd4c07de39a6d4836a57fae86e03b0702a14231a22976a6aaf4aa3cd28f20f62730f37e961f74acb06da099d7775717bad05dee19b33a40f7c8a6a74a206b0e5a9ec8d515bf9efb551af2842ba255d583cf2bed2b3848124376c7df28896cabdc54f872425631f27dd99fb3942fa8756472ade7ba0f91b362f4f2d0bf06eb97355e717c639878fd34f584b0f6233ec27727f16d73e648a0affe102daa428b2572fb945e59c5b1e6c8c93ba4f69f5790c5b1d9a6affc466636bab82bd6746ba03814529f576dd88fb143dbf624f33b362fff3e1379632662e63716", 0xf8, 0x7fff}, {&(0x7f0000000500)="80b9e05f3806ba3748d5e8d108a00cc69820cc41f900032847e6eaca1585370f5f3cc326dacd03195b4dd8c4274e6774abfdd0267fc30031050196afefdcb11e098d9c967ec7db6d", 0x48, 0x1}, {&(0x7f0000000580)="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", 0x1000, 0x6}], 0x2300000, &(0x7f0000000480)={[{@extent_cache='extent_cache'}], [{@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@subj_type={'subj_type', 0x3d, '}GPL}'}}]}) fstat(0xffffffffffffffff, 0x0) getpid() getresgid(0x0, 0x0, 0x0) [ 108.332336][T10151] QAT: Invalid ioctl [ 108.429842][T10151] QAT: Invalid ioctl 23:27:17 executing program 0: syslog(0x9, &(0x7f0000000000)=""/93, 0xffffffffffffff56) [ 108.502254][T10151] QAT: Invalid ioctl [ 108.541131][T10161] XFS (loop1): Mounting V4 Filesystem 23:27:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) r7 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f0000001ac0)=0x92f2) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000001b00)) fcntl$setown(r8, 0x8, r5) [ 108.582917][T10175] QAT: Invalid ioctl 23:27:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000800)={{0x0, 0x8}, {0x7fffffff, 0x5}, 0xabc4, 0x5, 0x7}) socket$inet6_dccp(0xa, 0x6, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x80100) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x208e, 0x18, 0x1, 0xffffffffffffff9c}) accept4$tipc(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fstat(r1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/load\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) accept(0xffffffffffffffff, &(0x7f0000000280)=@generic, &(0x7f0000000080)=0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65306a22fb9495ae1ca58998e5af60bbf4ea2c6c6f7765726469723d2e"]) r2 = semget(0xffffffffffffffff, 0x0, 0x28) syz_mount_image$ceph(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000440)='./file0\x00', 0x1379000000, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000480)="02e18149c7b53a3bb4c19d3820fa704efd00fe64c7919c9549bf31109fc69e38ecd230109e9c577117cd85dbac6f5bf865eeee63e3ea5f5ebf80b3d64de8d0d5bc17b67e68ecb2c203a9c71b082761001205c191a118c97887b9763823f63d7ade3e442848b0effc77c39df9d56005a682551048f521abca3ce2fd452cee49946149515382c4dfc4271f9dab3030092d5f23e0626fbdfc0434152a61480aaf279138553953901fd73b80d0317d3c619aca640e59fd96dcbae3402f1a60a8091e04fba9505c914af4020a2412a06853803ace865776995a07d084db9963ef25f0886cdba5d4ee97c6df8a5bef0fb768eaba66b3e7cfe76bc2ba", 0xf9, 0x33}, {&(0x7f0000000580)="e1c59dbb5f6bd27d9e773f39cdc178dd8797c4608bce92cc50494947b475576ef9e456535c52b1fe2d1112121c15f0b38561f59e50ed8a1315517a48d809e34af3893cf3ece73f2ed8d0750442ad06cf7b2c28a565a5030d9f6fcd031071b7f3e763fa5ff916b3bec8691f550e7265bf35394c1a4fdb198cb89c3d8df54090b3a241cb2d4de1cc6dc22e86ed4c25df6072591ff2c14ea2d169bcd1eb676d06ef61e3cfd9bb3f3fb05bb38da0ca304930badf86b8308765ef4b42de72312d9c50e1c6e67e9c12c3a84b6f5b6eb644c0", 0xcf, 0x1}, {&(0x7f0000000680)="5a162459f7916770d8cecf92d4ae16a0eefd95f784d40d2df5748a834e52bbc9a303de974f", 0x25, 0xfff}], 0x1208008, &(0x7f0000000740)='cgroup2\x00') semctl$GETALL(0x0, 0x0, 0xd, 0x0) semctl$SEM_INFO(r2, 0x7, 0x13, &(0x7f0000000380)=""/3) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 23:27:17 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) syz_read_part_table(0xff, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f00000000c0)=0x2) fsync(r0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x0, 0x0) [ 108.620604][T10161] XFS (loop1): empty log check failed 23:27:17 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.redirect\x00', &(0x7f00000008c0)='./file0\x00', 0x8, 0x3) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000900)=0x1, 0x4) get_mempolicy(&(0x7f0000000940), &(0x7f0000000980), 0xffffffffffffffda, &(0x7f0000ffc000/0x4000)=nil, 0x3) openat$ashmem(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ashmem\x00', 0x2000, 0x0) [ 108.661014][ T26] audit: type=1400 audit(1563233237.330:349): avc: denied { syslog } for pid=10182 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 108.692586][T10161] XFS (loop1): log mount/recovery failed: error -5 23:27:17 executing program 0: syslog(0x9, &(0x7f0000000000)=""/93, 0xffffffffffffff56) [ 108.754128][T10161] XFS (loop1): log mount failed [ 108.827361][T10196] QAT: Invalid ioctl [ 108.877724][T10196] QAT: Invalid ioctl 23:27:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) r7 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f0000001ac0)=0x92f2) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000001b00)) [ 108.947083][T10196] QAT: Invalid ioctl [ 108.979575][T10196] QAT: Invalid ioctl 23:27:17 executing program 0: syslog(0x9, &(0x7f0000000000)=""/93, 0xffffffffffffff56) [ 109.022211][T10196] QAT: Invalid ioctl [ 109.061755][T10196] QAT: Invalid ioctl [ 109.173668][T10209] ceph: device name is missing path (no : separator in /dev/loop3) 23:27:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000280)=0x19b1, 0x4) [ 109.221823][T10199] overlayfs: missing 'workdir' 23:27:17 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) syz_read_part_table(0xff, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f00000000c0)=0x2) fsync(r0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x0, 0x0) 23:27:17 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.redirect\x00', &(0x7f00000008c0)='./file0\x00', 0x8, 0x3) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000900)=0x1, 0x4) get_mempolicy(&(0x7f0000000940), &(0x7f0000000980), 0xffffffffffffffda, &(0x7f0000ffc000/0x4000)=nil, 0x3) openat$ashmem(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ashmem\x00', 0x2000, 0x0) 23:27:17 executing program 0: syslog(0x9, &(0x7f0000000000)=""/93, 0xffffffffffffff56) 23:27:18 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="0b97e0ba5a81e510ddfa510c80c0223f4a2e12f59e432e5f91e5b561a6b28850c72ac2a379dff5fde492749f34b14dc3d3f109272d6bc7c9c7f384be4f919b862fdf02613e38210714cabc9c70184d88085cd2b1ba392fa35b196cc1dedef291806c89e620c394a3a2ca75340db31b58103e771dc72e5c7566c5e019c54359a6d9f873edb399945ca95a35944baab21ba6b219f02cd7cc4451f8c649d0dd93db08b652a74795951de85af458f66e1c0cd7c60de6fd1b324d9b6cab982d5de11b41b0e9cf28d750207fb198e64b5aed8e2ec295923b36e73f078a016af4b27e2a07da69f7012982e4bbc9f98f57fe2c946169b8d9c633a574b65d824c977d516d252f1171fa8ddd3d2bd16b8043ce9685425a2541f045b6ca19770a64f764009a80cc1f0a96adf3a9e71f53709d5ab4763e330de643d0d5801cf024f1c672a6487c54801760f66d263ab453580a80cd2c3b210a838d12da75daa49767c0e316a282e5258f1e85759bc69ea5869936526438f21a4bc93ab3e9b3648633ff75024fec4b5d1f5e883ea95d065599f644413369e474b7a2581e85bf297e8f12fb52fbb884b1bd309e0976671067566a08d20c25778cc87ae2cee799a973215477855d20bc777dfbd777d11085e2310527b156852e935e1e6024447daad0b5b136aaee91c1c9e85dabf932fb78992ca10fa21f45afe5ac033924b8ef194392d7fffcfed1487bf0fa7af0e8f8fb5390e52f5287b59af7ae2068aceaae51b2925ddf64dc7b29eb7bdddff94a4a1397c2ac570c57de102e01a773d04cb0225b3ee1b60a32dacddbdaa67c2eb728ea8343418133482d9d9b7ef11f0b2d82cea828c234c9d9c31cdb65047223b86f2cb11728e32261d095dbc3d24ce506807c004b392186198efa96942bbf37977b2704bbe54d38d641f5728a8a2552069de1c4a42b91ca70136c45b2efc46032507bc5efa760835b588a366bf760426490d3d145345d995278af5ead8c0e8671b10fde81d46fd0959b97d93eac584ddd97f19fa7755fcd8b4ef91b46f8b3bdce9fb33e1c60635150a0abb1f5c029ef4a2ac2c26a0934eaaad697572c4299570d13e3723901f40cd3c5df2e790b2dc88b54a39381eec64a93389e6a208571882c9b4638feec4a6d929f11bb26b2c51e00d44c7d8c752b81143248082f2a2a578b15a9b1b33c0e4b6b9c92a6a10d4cf0e515ab371ac193ef59773f0f960bce5c36feee4fecf759ba0c33e85ecbaabb3c3c2f7990a97b297da32df09f7171c6f5cc26d4ec9ea6ee98c54d9ce1d964003f5488a018ca2d8b95b52bc10cd380f74c8dbaf139ce25f8bd06911df0d2c5c9393bd7e7e386d2be0206407d1a55f16cfb0903355a6b7b86c2d24492fa28e740f839d63843ddf7d7bfbce1f8b637c6ea02aae4ec8a95ebb692366fc2b0be9f16397cf71e425017b25f0ad55269e294c9a0575a92182d72db4110226260d10f1080f1b68705c6b186512c903c5c2a5182fed91136d598a8a01cd0c2cbfc8981aab505d66cfbe9349739fe5368fa19d2abf71a796e781e9b174ac6c318f40c694fe247a5593c88b2380c1cb41883a11cfe34e8e0683b1c49131aa4f36fed30feb8b90a88b081accb5b3636351e643baaa4058750c73c3d0088815cb35bf147e54112a6ee8112ce55b12072922976885593b8683e0be35a4c61d3c253c63ffef38c24ce5b6219fc03eed181226d83f445e981a96888ff0b69f41fd29b1b41eda1d6737c850481938c01a051cdda2726e71fd87460daf3282a30ad00b15482415c19f09f8ba991b526b527a5a3b5759f82004989f8bd0deab09b0db7950cbe6042d72d302b2cd74c8a0c2eb9bf800fece0958132009409da36821cecc36a7b09829e6095cab0de4af8752b6bc9de12f53c3e7855b914885c4d86e7daaa055eba43c1f622dc3bd9825386c2205d1a4436a5c15cf62a17923d7dbe0cd1fce2918fcee58a898c74ea29e294a653435e8f73a186e45451c0af6ef738eed547f1451600c9a5dad4cd53b168819cb3a4bc8b1c713ccd2850a0344fdca01dbd0439cb84d44579cd137525a5ed3cba4b01635c4bcd4fc323bcab4e1156befb046981382daf8226b123f9317a34e7984dc23b8db2b397a3995072a2278125c6eeedaeb38c262774601479a521b3c0e5d9c1be280339a9a6ab91c578b6aee4bcb8c393883a69bc3b2071db43e0a8b2a24d34af61afcc3de03166859853d34cde734cbaa8f72cd8ce576a447200b1f53efde47aa142f3844845815545c9008aac9b2d7a9cb10c75ba7074fb64a00eac91bd2d13e7f283e31851b4f5684b5e9496e483beeb544725b2137d30de44c4ceea9d0e580de312cdbe9bbf610d92c9fe65681e3fe7111e578cbac04caae4053137423d410a17c2f8e31e484deceec9b34860cb99c8f56b548373818c29e788e9bcd1d588dae782082e59364e926fb808e0aebaef935a03865a4bd33e571a6d8cf43023cebce3d2b50a76785f363103b5434ca9b48273f4c63d911a6340f7d9a29759176437091fdf8fb26bf8d3f2828783399f01bc1b8f5d77010eabc27ba57f66df264688cd23eb65a3a970e6acd5c8853e69769c02863fba6535e7192455749dab4e74e09017054c2f325d6c9d305ff5f05167bbfe5be424d4ee130b6c7f27305050a3191fb155ffb22d82e5153b1b6426c9eb7429c9b114447e8c42f3588d4e566592aacbeac857b3a8860a15c6e0baae07896190827262884c9eac0508f5692e463135244f96ad45ce49a8f76aed0ce1479cfc4ed9b91ac05a21cf3f758bd4a57a10cf6db7c84aae8b14caa6a594bab9b46717a9cc0c91bace207874045e5b230d4a6335e1e7daab0c83ac4f525c613c2269e5bdad778fde44cc119fb3a069e80834d0f4afc2ee8d324fb21d97f65f9c93e2e90b4e99aca228919dc02e3dd2849cfc4c896a528134ac5dbc183aa084cf605f7438504a9d889cdaea1b946d154879f728509929d80bd7d70f9b491c628b5a020007b78b6560a8d77e205d1639b7ae7a6af4a70190b69966c9b9513ce0f4e3d8de83dbed76708e70628ec8dd6998d62b9b4067aae27aca16df163f37009b100e8ad7a3b820c2f81b86bc0a05dd9f29a9cc5515cab8e4de9268ad90b49197a9e2e341990a07214033e9b7a4fcaa39f52f8e7f31f20bceb6c36d2dd40b7057646665169369dcc7df6a588e749032c912c14a29768ba8511cdbb2427369c77a63f45c818c6da29bf8b667b1808a9e9f7e2d81a7b59095d72b30bbda52fb003481d02a3c483335701a5b363a0654c735246eca6c147df3e3f1ba0055c90fec8d7430574f0fc59e547204772aa42fd1a89d1d4246ed5bc016e8d30ceed0d8b9befdfc6a1d17d7bbf36e18cfe83ee17579f0920b20e6473dd0597bca01a7e050d8b86b95fa521f039e615ce26f39b71b063b6ba6026e40911fe0751d37564e1bd30e732e2180210f1862e33b348adde34e0ff09fa1dcf0e8521f65b8b71c00f62f07e4a7273a399fa6f8e9ffe7d5c004e13bc301959799bd34a4264825d208237425695858314536895af8b6c5bb2361d6ea0e324fdfeb1d854ee97f1f6e2f3e39537451cd9cd913f5efc8e0ba38dd980dab9918ab1839b270e5a1aed29f8d6ce63b7a7b5a61d051f0f9fb70306526a17b45513ee10593e2c184e402dbcfc10d7b9c3b179779a638c1036a2f04b42433f9d8d7653837ea71aad81f54ca86066bf31183dbefbe7c3904e2f972c08e39c0c1f3cef11adf0564ed42213667de9d7d095cd99d5ab993ea6662f63cf83f7a65edd505f4004dd354b0fb1d741c0fbd877c65afa3f74c0bc92efacb90b1a56c9695cb37c4c84a592ce7f0717f8550ec683e5010f7572c4250902a9e8516ce55b8a5a972d94f29cbef390dc1a35124b5b5e8ba1946dd820d0a4ba506b411023ca1f9a0c0aabf0214c0009f3a0ef6fcbbbf72e574e6d60800ad16a0d4a68a244ccf67e21fca669754bef2875776706fc97541f08edab2b51f5bf3a4ce5852ce4ac66215cafaac4d6c9e07b46629453cd67e05e1aa68d14be25bc12bdc72776c018b1f3ce7658d2221f7559cb5ada26e7b9f97ee3459f1a5d98669613fd1d55525a5e920922a9080545465359dd4c5bc8f6e42921e0b3a4e15767f49785c3dbba5d2a1772745b1d7ac76db21624c05082c07da1d2d5504c5eb28c7b57347194ce1652599a8f691520c21b10107b9608a5e2b93923655db9f064c9b00bf5abd66c66559d05c30de9e6a13a90cf49f2df71f2e70103f6d2c6f2c6a5195ef31dc093fbcf054611bb41d132ceac0c33e0b5f1e10af6dcee22be1122c22e4db6f98d3e00ace628416c3c6f053cd7b588cc28b1a7cd74c8a4704a036fab6dc873f4b3174abb004f223724c7254ff19edf32a5af2bfebcc6e222bf284f5f9ff6a2ce4689dac691414f948bc6967a9abaafce1a6ab3bde948eb401673617e71d7c70e68006894a3007df712b584a6b0a0f127062c10ce0639ced8c61d1444e60a6ce3aec5e0ab493d0ff10cd31d7fa634b542bfec9216fdd8ebebe57106d79465067002a3b25e0b282658cef369600e6093ecd1fb7d476a87498b40e8c1104ab74c7489a4a201f62835135e104f48fbc3626395be3cfc2326db6e97188d175a048eddfa75d0c0376053fba00c4dc656e0a0c409990bb229ff85967c0e64227b65074e478f6b4dbe731962d840df91c946360bf843c1e5bdf5adb420516807d6b006f5b1743c0264926da70d0906f07787fd86401e65c66c94acfa67f56bef906cefef667fbec5fac762e2440b38595340e61299f271091defbea0148697f077e5135202e76131dfd5ef54c5525289f3f93ede0aff5487ad90bb99591874bee3a6262e0ba292321aa5e493af800d8f8b589eb0a106b63ec5efba24bf328f202d7d6c2c02d89e95d56421ce1e04f65092ff4f3d67cc9d214140b740b6675a0f740b7de93f3c5a1f509d305180963f146a2803a84d7098db23d6dbd9f4a57833d071973e2df2e8546e9781f8e95e864f2d7ec4ef50baf372931cb0905a5288b92d9b6235822ffb655cb9689ac73e298432e70b1ff42a38946113c0c3633d1a9fadcef21c786ea95eeb70f397aad19c08c720b2e667a46b4d065b652499d3ae105f7a95be1a3bdd6b1c8e4ffedb9ac417fbc44da5d1577ab592e8ea20f366cd56970a3a73509aaf67316f4bfb0f29b36fa600b13c03baa4d5fa74563958350db04267fdf1e545ba54c6dfc7d0508e58664db2e8dbdd27a15ef90cd893bbfeefad863e16e54a8bdd4780058435eb45ad29eadd3b8696c68687dec0b448317f8378386a0da73dc0514031bf47da063b0e1aa0752284154ffa60591f75f66ea4db152ed70ba26e2e1bd20833d7d8bd12251e7895c4572ac009d63d5a737769e0361ab433fec79303190e9ac9657f83b3b29729b17844310f6765eca634b983885e644b8f5b84c4963c2ecca6371ee3a2760663003287cab56acc85b6ef9ab037e8e60d55fead6c3864a2ad5a470520d7aa0500f04eaf5725fe076a9224bc0d4fcd3f7cf31295253c953938bc5bb271d30896acdd1632b722705d5cdf137c5c67219a2fbd0662b03fbd1978682b53326f3585384fee3e005b1c26e973ca2fd5cc6de8c33da24f4b9bed9c166bef2c9ee44842ee6c40b0d7bb84fb274ea5a8cc8346250efe2f4e6e07f8666dbe1579aa94097761773808968257fed0fd5890e27ae9f1c0d6933e36a78215163db325866c24666dcd87acb9245cd1c1c258871b4c42429be4c1c72fc965df4", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) r7 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f0000001ac0)=0x92f2) socket$bt_bnep(0x1f, 0x3, 0x4) [ 109.445706][T10232] QAT: Invalid ioctl [ 109.452122][T10209] overlayfs: missing 'workdir' 23:27:18 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) syz_read_part_table(0xff, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f00000000c0)=0x2) fsync(r0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x0, 0x0) [ 109.528348][T10232] QAT: Invalid ioctl 23:27:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000800)={{0x0, 0x8}, {0x7fffffff, 0x5}, 0xabc4, 0x5, 0x7}) socket$inet6_dccp(0xa, 0x6, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x80100) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x208e, 0x18, 0x1, 0xffffffffffffff9c}) accept4$tipc(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fstat(r1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/load\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) accept(0xffffffffffffffff, &(0x7f0000000280)=@generic, &(0x7f0000000080)=0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65306a22fb9495ae1ca58998e5af60bbf4ea2c6c6f7765726469723d2e"]) r2 = semget(0xffffffffffffffff, 0x0, 0x28) syz_mount_image$ceph(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000440)='./file0\x00', 0x1379000000, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000480)="02e18149c7b53a3bb4c19d3820fa704efd00fe64c7919c9549bf31109fc69e38ecd230109e9c577117cd85dbac6f5bf865eeee63e3ea5f5ebf80b3d64de8d0d5bc17b67e68ecb2c203a9c71b082761001205c191a118c97887b9763823f63d7ade3e442848b0effc77c39df9d56005a682551048f521abca3ce2fd452cee49946149515382c4dfc4271f9dab3030092d5f23e0626fbdfc0434152a61480aaf279138553953901fd73b80d0317d3c619aca640e59fd96dcbae3402f1a60a8091e04fba9505c914af4020a2412a06853803ace865776995a07d084db9963ef25f0886cdba5d4ee97c6df8a5bef0fb768eaba66b3e7cfe76bc2ba", 0xf9, 0x33}, {&(0x7f0000000580)="e1c59dbb5f6bd27d9e773f39cdc178dd8797c4608bce92cc50494947b475576ef9e456535c52b1fe2d1112121c15f0b38561f59e50ed8a1315517a48d809e34af3893cf3ece73f2ed8d0750442ad06cf7b2c28a565a5030d9f6fcd031071b7f3e763fa5ff916b3bec8691f550e7265bf35394c1a4fdb198cb89c3d8df54090b3a241cb2d4de1cc6dc22e86ed4c25df6072591ff2c14ea2d169bcd1eb676d06ef61e3cfd9bb3f3fb05bb38da0ca304930badf86b8308765ef4b42de72312d9c50e1c6e67e9c12c3a84b6f5b6eb644c0", 0xcf, 0x1}, {&(0x7f0000000680)="5a162459f7916770d8cecf92d4ae16a0eefd95f784d40d2df5748a834e52bbc9a303de974f", 0x25, 0xfff}], 0x1208008, &(0x7f0000000740)='cgroup2\x00') semctl$GETALL(0x0, 0x0, 0xd, 0x0) semctl$SEM_INFO(r2, 0x7, 0x13, &(0x7f0000000380)=""/3) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 109.570612][T10232] QAT: Invalid ioctl [ 109.579632][T10224] XFS (loop1): Mounting V4 Filesystem [ 109.627365][T10244] QAT: Invalid ioctl [ 109.661216][T10224] XFS (loop1): empty log check failed [ 109.668215][T10232] QAT: Invalid ioctl 23:27:18 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) syz_read_part_table(0xff, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f00000000c0)=0x2) fsync(r0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x0, 0x0) [ 109.703463][T10224] XFS (loop1): log mount/recovery failed: error -5 [ 109.740560][T10244] QAT: Invalid ioctl [ 109.793049][T10224] XFS (loop1): log mount failed 23:27:18 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) r7 = semget$private(0x0, 0x1, 0x40) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f0000001ac0)=0x92f2) 23:27:18 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.redirect\x00', &(0x7f00000008c0)='./file0\x00', 0x8, 0x3) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000900)=0x1, 0x4) get_mempolicy(&(0x7f0000000940), &(0x7f0000000980), 0xffffffffffffffda, &(0x7f0000ffc000/0x4000)=nil, 0x3) [ 109.901957][T10265] overlayfs: missing 'workdir' [ 110.015337][T10273] QAT: Invalid ioctl [ 110.041830][T10273] QAT: Invalid ioctl 23:27:18 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.redirect\x00', &(0x7f00000008c0)='./file0\x00', 0x8, 0x3) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000900)=0x1, 0x4) [ 110.063987][T10273] QAT: Invalid ioctl [ 110.071094][T10273] QAT: Invalid ioctl [ 110.081724][T10273] QAT: Invalid ioctl [ 110.086310][T10273] QAT: Invalid ioctl 23:27:18 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="0b97e0ba5a81e510ddfa510c80c0223f4a2e12f59e432e5f91e5b561a6b28850c72ac2a379dff5fde492749f34b14dc3d3f109272d6bc7c9c7f384be4f919b862fdf02613e38210714cabc9c70184d88085cd2b1ba392fa35b196cc1dedef291806c89e620c394a3a2ca75340db31b58103e771dc72e5c7566c5e019c54359a6d9f873edb399945ca95a35944baab21ba6b219f02cd7cc4451f8c649d0dd93db08b652a74795951de85af458f66e1c0cd7c60de6fd1b324d9b6cab982d5de11b41b0e9cf28d750207fb198e64b5aed8e2ec295923b36e73f078a016af4b27e2a07da69f7012982e4bbc9f98f57fe2c946169b8d9c633a574b65d824c977d516d252f1171fa8ddd3d2bd16b8043ce9685425a2541f045b6ca19770a64f764009a80cc1f0a96adf3a9e71f53709d5ab4763e330de643d0d5801cf024f1c672a6487c54801760f66d263ab453580a80cd2c3b210a838d12da75daa49767c0e316a282e5258f1e85759bc69ea5869936526438f21a4bc93ab3e9b3648633ff75024fec4b5d1f5e883ea95d065599f644413369e474b7a2581e85bf297e8f12fb52fbb884b1bd309e0976671067566a08d20c25778cc87ae2cee799a973215477855d20bc777dfbd777d11085e2310527b156852e935e1e6024447daad0b5b136aaee91c1c9e85dabf932fb78992ca10fa21f45afe5ac033924b8ef194392d7fffcfed1487bf0fa7af0e8f8fb5390e52f5287b59af7ae2068aceaae51b2925ddf64dc7b29eb7bdddff94a4a1397c2ac570c57de102e01a773d04cb0225b3ee1b60a32dacddbdaa67c2eb728ea8343418133482d9d9b7ef11f0b2d82cea828c234c9d9c31cdb65047223b86f2cb11728e32261d095dbc3d24ce506807c004b392186198efa96942bbf37977b2704bbe54d38d641f5728a8a2552069de1c4a42b91ca70136c45b2efc46032507bc5efa760835b588a366bf760426490d3d145345d995278af5ead8c0e8671b10fde81d46fd0959b97d93eac584ddd97f19fa7755fcd8b4ef91b46f8b3bdce9fb33e1c60635150a0abb1f5c029ef4a2ac2c26a0934eaaad697572c4299570d13e3723901f40cd3c5df2e790b2dc88b54a39381eec64a93389e6a208571882c9b4638feec4a6d929f11bb26b2c51e00d44c7d8c752b81143248082f2a2a578b15a9b1b33c0e4b6b9c92a6a10d4cf0e515ab371ac193ef59773f0f960bce5c36feee4fecf759ba0c33e85ecbaabb3c3c2f7990a97b297da32df09f7171c6f5cc26d4ec9ea6ee98c54d9ce1d964003f5488a018ca2d8b95b52bc10cd380f74c8dbaf139ce25f8bd06911df0d2c5c9393bd7e7e386d2be0206407d1a55f16cfb0903355a6b7b86c2d24492fa28e740f839d63843ddf7d7bfbce1f8b637c6ea02aae4ec8a95ebb692366fc2b0be9f16397cf71e425017b25f0ad55269e294c9a0575a92182d72db4110226260d10f1080f1b68705c6b186512c903c5c2a5182fed91136d598a8a01cd0c2cbfc8981aab505d66cfbe9349739fe5368fa19d2abf71a796e781e9b174ac6c318f40c694fe247a5593c88b2380c1cb41883a11cfe34e8e0683b1c49131aa4f36fed30feb8b90a88b081accb5b3636351e643baaa4058750c73c3d0088815cb35bf147e54112a6ee8112ce55b12072922976885593b8683e0be35a4c61d3c253c63ffef38c24ce5b6219fc03eed181226d83f445e981a96888ff0b69f41fd29b1b41eda1d6737c850481938c01a051cdda2726e71fd87460daf3282a30ad00b15482415c19f09f8ba991b526b527a5a3b5759f82004989f8bd0deab09b0db7950cbe6042d72d302b2cd74c8a0c2eb9bf800fece0958132009409da36821cecc36a7b09829e6095cab0de4af8752b6bc9de12f53c3e7855b914885c4d86e7daaa055eba43c1f622dc3bd9825386c2205d1a4436a5c15cf62a17923d7dbe0cd1fce2918fcee58a898c74ea29e294a653435e8f73a186e45451c0af6ef738eed547f1451600c9a5dad4cd53b168819cb3a4bc8b1c713ccd2850a0344fdca01dbd0439cb84d44579cd137525a5ed3cba4b01635c4bcd4fc323bcab4e1156befb046981382daf8226b123f9317a34e7984dc23b8db2b397a3995072a2278125c6eeedaeb38c262774601479a521b3c0e5d9c1be280339a9a6ab91c578b6aee4bcb8c393883a69bc3b2071db43e0a8b2a24d34af61afcc3de03166859853d34cde734cbaa8f72cd8ce576a447200b1f53efde47aa142f3844845815545c9008aac9b2d7a9cb10c75ba7074fb64a00eac91bd2d13e7f283e31851b4f5684b5e9496e483beeb544725b2137d30de44c4ceea9d0e580de312cdbe9bbf610d92c9fe65681e3fe7111e578cbac04caae4053137423d410a17c2f8e31e484deceec9b34860cb99c8f56b548373818c29e788e9bcd1d588dae782082e59364e926fb808e0aebaef935a03865a4bd33e571a6d8cf43023cebce3d2b50a76785f363103b5434ca9b48273f4c63d911a6340f7d9a29759176437091fdf8fb26bf8d3f2828783399f01bc1b8f5d77010eabc27ba57f66df264688cd23eb65a3a970e6acd5c8853e69769c02863fba6535e7192455749dab4e74e09017054c2f325d6c9d305ff5f05167bbfe5be424d4ee130b6c7f27305050a3191fb155ffb22d82e5153b1b6426c9eb7429c9b114447e8c42f3588d4e566592aacbeac857b3a8860a15c6e0baae07896190827262884c9eac0508f5692e463135244f96ad45ce49a8f76aed0ce1479cfc4ed9b91ac05a21cf3f758bd4a57a10cf6db7c84aae8b14caa6a594bab9b46717a9cc0c91bace207874045e5b230d4a6335e1e7daab0c83ac4f525c613c2269e5bdad778fde44cc119fb3a069e80834d0f4afc2ee8d324fb21d97f65f9c93e2e90b4e99aca228919dc02e3dd2849cfc4c896a528134ac5dbc183aa084cf605f7438504a9d889cdaea1b946d154879f728509929d80bd7d70f9b491c628b5a020007b78b6560a8d77e205d1639b7ae7a6af4a70190b69966c9b9513ce0f4e3d8de83dbed76708e70628ec8dd6998d62b9b4067aae27aca16df163f37009b100e8ad7a3b820c2f81b86bc0a05dd9f29a9cc5515cab8e4de9268ad90b49197a9e2e341990a07214033e9b7a4fcaa39f52f8e7f31f20bceb6c36d2dd40b7057646665169369dcc7df6a588e749032c912c14a29768ba8511cdbb2427369c77a63f45c818c6da29bf8b667b1808a9e9f7e2d81a7b59095d72b30bbda52fb003481d02a3c483335701a5b363a0654c735246eca6c147df3e3f1ba0055c90fec8d7430574f0fc59e547204772aa42fd1a89d1d4246ed5bc016e8d30ceed0d8b9befdfc6a1d17d7bbf36e18cfe83ee17579f0920b20e6473dd0597bca01a7e050d8b86b95fa521f039e615ce26f39b71b063b6ba6026e40911fe0751d37564e1bd30e732e2180210f1862e33b348adde34e0ff09fa1dcf0e8521f65b8b71c00f62f07e4a7273a399fa6f8e9ffe7d5c004e13bc301959799bd34a4264825d208237425695858314536895af8b6c5bb2361d6ea0e324fdfeb1d854ee97f1f6e2f3e39537451cd9cd913f5efc8e0ba38dd980dab9918ab1839b270e5a1aed29f8d6ce63b7a7b5a61d051f0f9fb70306526a17b45513ee10593e2c184e402dbcfc10d7b9c3b179779a638c1036a2f04b42433f9d8d7653837ea71aad81f54ca86066bf31183dbefbe7c3904e2f972c08e39c0c1f3cef11adf0564ed42213667de9d7d095cd99d5ab993ea6662f63cf83f7a65edd505f4004dd354b0fb1d741c0fbd877c65afa3f74c0bc92efacb90b1a56c9695cb37c4c84a592ce7f0717f8550ec683e5010f7572c4250902a9e8516ce55b8a5a972d94f29cbef390dc1a35124b5b5e8ba1946dd820d0a4ba506b411023ca1f9a0c0aabf0214c0009f3a0ef6fcbbbf72e574e6d60800ad16a0d4a68a244ccf67e21fca669754bef2875776706fc97541f08edab2b51f5bf3a4ce5852ce4ac66215cafaac4d6c9e07b46629453cd67e05e1aa68d14be25bc12bdc72776c018b1f3ce7658d2221f7559cb5ada26e7b9f97ee3459f1a5d98669613fd1d55525a5e920922a9080545465359dd4c5bc8f6e42921e0b3a4e15767f49785c3dbba5d2a1772745b1d7ac76db21624c05082c07da1d2d5504c5eb28c7b57347194ce1652599a8f691520c21b10107b9608a5e2b93923655db9f064c9b00bf5abd66c66559d05c30de9e6a13a90cf49f2df71f2e70103f6d2c6f2c6a5195ef31dc093fbcf054611bb41d132ceac0c33e0b5f1e10af6dcee22be1122c22e4db6f98d3e00ace628416c3c6f053cd7b588cc28b1a7cd74c8a4704a036fab6dc873f4b3174abb004f223724c7254ff19edf32a5af2bfebcc6e222bf284f5f9ff6a2ce4689dac691414f948bc6967a9abaafce1a6ab3bde948eb401673617e71d7c70e68006894a3007df712b584a6b0a0f127062c10ce0639ced8c61d1444e60a6ce3aec5e0ab493d0ff10cd31d7fa634b542bfec9216fdd8ebebe57106d79465067002a3b25e0b282658cef369600e6093ecd1fb7d476a87498b40e8c1104ab74c7489a4a201f62835135e104f48fbc3626395be3cfc2326db6e97188d175a048eddfa75d0c0376053fba00c4dc656e0a0c409990bb229ff85967c0e64227b65074e478f6b4dbe731962d840df91c946360bf843c1e5bdf5adb420516807d6b006f5b1743c0264926da70d0906f07787fd86401e65c66c94acfa67f56bef906cefef667fbec5fac762e2440b38595340e61299f271091defbea0148697f077e5135202e76131dfd5ef54c5525289f3f93ede0aff5487ad90bb99591874bee3a6262e0ba292321aa5e493af800d8f8b589eb0a106b63ec5efba24bf328f202d7d6c2c02d89e95d56421ce1e04f65092ff4f3d67cc9d214140b740b6675a0f740b7de93f3c5a1f509d305180963f146a2803a84d7098db23d6dbd9f4a57833d071973e2df2e8546e9781f8e95e864f2d7ec4ef50baf372931cb0905a5288b92d9b6235822ffb655cb9689ac73e298432e70b1ff42a38946113c0c3633d1a9fadcef21c786ea95eeb70f397aad19c08c720b2e667a46b4d065b652499d3ae105f7a95be1a3bdd6b1c8e4ffedb9ac417fbc44da5d1577ab592e8ea20f366cd56970a3a73509aaf67316f4bfb0f29b36fa600b13c03baa4d5fa74563958350db04267fdf1e545ba54c6dfc7d0508e58664db2e8dbdd27a15ef90cd893bbfeefad863e16e54a8bdd4780058435eb45ad29eadd3b8696c68687dec0b448317f8378386a0da73dc0514031bf47da063b0e1aa0752284154ffa60591f75f66ea4db152ed70ba26e2e1bd20833d7d8bd12251e7895c4572ac009d63d5a737769e0361ab433fec79303190e9ac9657f83b3b29729b17844310f6765eca634b983885e644b8f5b84c4963c2ecca6371ee3a2760663003287cab56acc85b6ef9ab037e8e60d55fead6c3864a2ad5a470520d7aa0500f04eaf5725fe076a9224bc0d4fcd3f7cf31295253c953938bc5bb271d30896acdd1632b722705d5cdf137c5c67219a2fbd0662b03fbd1978682b53326f3585384fee3e005b1c26e973ca2fd5cc6de8c33da24f4b9bed9c166bef2c9ee44842ee6c40b0d7bb84fb274ea5a8cc8346250efe2f4e6e07f8666dbe1579aa94097761773808968257fed0fd5890e27ae9f1c0d6933e36a78215163db325866c24666dcd87acb9245cd1c1c258871b4c42429be4c1c72fc965df4", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) semget$private(0x0, 0x1, 0x40) [ 110.170199][T10265] ceph: device name is missing path (no : separator in /dev/loop3) [ 110.318343][T10285] QAT: Invalid ioctl 23:27:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000280)=0x19b1, 0x4) [ 110.366577][T10285] QAT: Invalid ioctl [ 110.386601][T10285] QAT: Invalid ioctl [ 110.398083][T10285] QAT: Invalid ioctl 23:27:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000800)={{0x0, 0x8}, {0x7fffffff, 0x5}, 0xabc4, 0x5, 0x7}) socket$inet6_dccp(0xa, 0x6, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x80100) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x208e, 0x18, 0x1, 0xffffffffffffff9c}) accept4$tipc(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fstat(r1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/load\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) accept(0xffffffffffffffff, &(0x7f0000000280)=@generic, &(0x7f0000000080)=0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65306a22fb9495ae1ca58998e5af60bbf4ea2c6c6f7765726469723d2e"]) r2 = semget(0xffffffffffffffff, 0x0, 0x28) syz_mount_image$ceph(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000440)='./file0\x00', 0x1379000000, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000480)="02e18149c7b53a3bb4c19d3820fa704efd00fe64c7919c9549bf31109fc69e38ecd230109e9c577117cd85dbac6f5bf865eeee63e3ea5f5ebf80b3d64de8d0d5bc17b67e68ecb2c203a9c71b082761001205c191a118c97887b9763823f63d7ade3e442848b0effc77c39df9d56005a682551048f521abca3ce2fd452cee49946149515382c4dfc4271f9dab3030092d5f23e0626fbdfc0434152a61480aaf279138553953901fd73b80d0317d3c619aca640e59fd96dcbae3402f1a60a8091e04fba9505c914af4020a2412a06853803ace865776995a07d084db9963ef25f0886cdba5d4ee97c6df8a5bef0fb768eaba66b3e7cfe76bc2ba", 0xf9, 0x33}, {&(0x7f0000000580)="e1c59dbb5f6bd27d9e773f39cdc178dd8797c4608bce92cc50494947b475576ef9e456535c52b1fe2d1112121c15f0b38561f59e50ed8a1315517a48d809e34af3893cf3ece73f2ed8d0750442ad06cf7b2c28a565a5030d9f6fcd031071b7f3e763fa5ff916b3bec8691f550e7265bf35394c1a4fdb198cb89c3d8df54090b3a241cb2d4de1cc6dc22e86ed4c25df6072591ff2c14ea2d169bcd1eb676d06ef61e3cfd9bb3f3fb05bb38da0ca304930badf86b8308765ef4b42de72312d9c50e1c6e67e9c12c3a84b6f5b6eb644c0", 0xcf, 0x1}, {&(0x7f0000000680)="5a162459f7916770d8cecf92d4ae16a0eefd95f784d40d2df5748a834e52bbc9a303de974f", 0x25, 0xfff}], 0x1208008, &(0x7f0000000740)='cgroup2\x00') semctl$GETALL(0x0, 0x0, 0xd, 0x0) semctl$SEM_INFO(r2, 0x7, 0x13, &(0x7f0000000380)=""/3) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 23:27:19 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.redirect\x00', &(0x7f00000008c0)='./file0\x00', 0x8, 0x3) [ 110.413227][T10285] QAT: Invalid ioctl [ 110.422075][T10285] QAT: Invalid ioctl 23:27:19 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000800)={{0x0, 0x8}, {0x7fffffff, 0x5}, 0xabc4, 0x5, 0x7}) socket$inet6_dccp(0xa, 0x6, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x80100) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x208e, 0x18, 0x1, 0xffffffffffffff9c}) accept4$tipc(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) fstat(r1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/load\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) accept(0xffffffffffffffff, &(0x7f0000000280)=@generic, &(0x7f0000000080)=0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65306a22fb9495ae1ca58998e5af60bbf4ea2c6c6f7765726469723d2e"]) r2 = semget(0xffffffffffffffff, 0x0, 0x28) syz_mount_image$ceph(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000440)='./file0\x00', 0x1379000000, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000480)="02e18149c7b53a3bb4c19d3820fa704efd00fe64c7919c9549bf31109fc69e38ecd230109e9c577117cd85dbac6f5bf865eeee63e3ea5f5ebf80b3d64de8d0d5bc17b67e68ecb2c203a9c71b082761001205c191a118c97887b9763823f63d7ade3e442848b0effc77c39df9d56005a682551048f521abca3ce2fd452cee49946149515382c4dfc4271f9dab3030092d5f23e0626fbdfc0434152a61480aaf279138553953901fd73b80d0317d3c619aca640e59fd96dcbae3402f1a60a8091e04fba9505c914af4020a2412a06853803ace865776995a07d084db9963ef25f0886cdba5d4ee97c6df8a5bef0fb768eaba66b3e7cfe76bc2ba", 0xf9, 0x33}, {&(0x7f0000000580)="e1c59dbb5f6bd27d9e773f39cdc178dd8797c4608bce92cc50494947b475576ef9e456535c52b1fe2d1112121c15f0b38561f59e50ed8a1315517a48d809e34af3893cf3ece73f2ed8d0750442ad06cf7b2c28a565a5030d9f6fcd031071b7f3e763fa5ff916b3bec8691f550e7265bf35394c1a4fdb198cb89c3d8df54090b3a241cb2d4de1cc6dc22e86ed4c25df6072591ff2c14ea2d169bcd1eb676d06ef61e3cfd9bb3f3fb05bb38da0ca304930badf86b8308765ef4b42de72312d9c50e1c6e67e9c12c3a84b6f5b6eb644c0", 0xcf, 0x1}, {&(0x7f0000000680)="5a162459f7916770d8cecf92d4ae16a0eefd95f784d40d2df5748a834e52bbc9a303de974f", 0x25, 0xfff}], 0x1208008, &(0x7f0000000740)='cgroup2\x00') semctl$GETALL(0x0, 0x0, 0xd, 0x0) semctl$SEM_INFO(r2, 0x7, 0x13, &(0x7f0000000380)=""/3) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 23:27:19 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="0b97e0ba5a81e510ddfa510c80c0223f4a2e12f59e432e5f91e5b561a6b28850c72ac2a379dff5fde492749f34b14dc3d3f109272d6bc7c9c7f384be4f919b862fdf02613e38210714cabc9c70184d88085cd2b1ba392fa35b196cc1dedef291806c89e620c394a3a2ca75340db31b58103e771dc72e5c7566c5e019c54359a6d9f873edb399945ca95a35944baab21ba6b219f02cd7cc4451f8c649d0dd93db08b652a74795951de85af458f66e1c0cd7c60de6fd1b324d9b6cab982d5de11b41b0e9cf28d750207fb198e64b5aed8e2ec295923b36e73f078a016af4b27e2a07da69f7012982e4bbc9f98f57fe2c946169b8d9c633a574b65d824c977d516d252f1171fa8ddd3d2bd16b8043ce9685425a2541f045b6ca19770a64f764009a80cc1f0a96adf3a9e71f53709d5ab4763e330de643d0d5801cf024f1c672a6487c54801760f66d263ab453580a80cd2c3b210a838d12da75daa49767c0e316a282e5258f1e85759bc69ea5869936526438f21a4bc93ab3e9b3648633ff75024fec4b5d1f5e883ea95d065599f644413369e474b7a2581e85bf297e8f12fb52fbb884b1bd309e0976671067566a08d20c25778cc87ae2cee799a973215477855d20bc777dfbd777d11085e2310527b156852e935e1e6024447daad0b5b136aaee91c1c9e85dabf932fb78992ca10fa21f45afe5ac033924b8ef194392d7fffcfed1487bf0fa7af0e8f8fb5390e52f5287b59af7ae2068aceaae51b2925ddf64dc7b29eb7bdddff94a4a1397c2ac570c57de102e01a773d04cb0225b3ee1b60a32dacddbdaa67c2eb728ea8343418133482d9d9b7ef11f0b2d82cea828c234c9d9c31cdb65047223b86f2cb11728e32261d095dbc3d24ce506807c004b392186198efa96942bbf37977b2704bbe54d38d641f5728a8a2552069de1c4a42b91ca70136c45b2efc46032507bc5efa760835b588a366bf760426490d3d145345d995278af5ead8c0e8671b10fde81d46fd0959b97d93eac584ddd97f19fa7755fcd8b4ef91b46f8b3bdce9fb33e1c60635150a0abb1f5c029ef4a2ac2c26a0934eaaad697572c4299570d13e3723901f40cd3c5df2e790b2dc88b54a39381eec64a93389e6a208571882c9b4638feec4a6d929f11bb26b2c51e00d44c7d8c752b81143248082f2a2a578b15a9b1b33c0e4b6b9c92a6a10d4cf0e515ab371ac193ef59773f0f960bce5c36feee4fecf759ba0c33e85ecbaabb3c3c2f7990a97b297da32df09f7171c6f5cc26d4ec9ea6ee98c54d9ce1d964003f5488a018ca2d8b95b52bc10cd380f74c8dbaf139ce25f8bd06911df0d2c5c9393bd7e7e386d2be0206407d1a55f16cfb0903355a6b7b86c2d24492fa28e740f839d63843ddf7d7bfbce1f8b637c6ea02aae4ec8a95ebb692366fc2b0be9f16397cf71e425017b25f0ad55269e294c9a0575a92182d72db4110226260d10f1080f1b68705c6b186512c903c5c2a5182fed91136d598a8a01cd0c2cbfc8981aab505d66cfbe9349739fe5368fa19d2abf71a796e781e9b174ac6c318f40c694fe247a5593c88b2380c1cb41883a11cfe34e8e0683b1c49131aa4f36fed30feb8b90a88b081accb5b3636351e643baaa4058750c73c3d0088815cb35bf147e54112a6ee8112ce55b12072922976885593b8683e0be35a4c61d3c253c63ffef38c24ce5b6219fc03eed181226d83f445e981a96888ff0b69f41fd29b1b41eda1d6737c850481938c01a051cdda2726e71fd87460daf3282a30ad00b15482415c19f09f8ba991b526b527a5a3b5759f82004989f8bd0deab09b0db7950cbe6042d72d302b2cd74c8a0c2eb9bf800fece0958132009409da36821cecc36a7b09829e6095cab0de4af8752b6bc9de12f53c3e7855b914885c4d86e7daaa055eba43c1f622dc3bd9825386c2205d1a4436a5c15cf62a17923d7dbe0cd1fce2918fcee58a898c74ea29e294a653435e8f73a186e45451c0af6ef738eed547f1451600c9a5dad4cd53b168819cb3a4bc8b1c713ccd2850a0344fdca01dbd0439cb84d44579cd137525a5ed3cba4b01635c4bcd4fc323bcab4e1156befb046981382daf8226b123f9317a34e7984dc23b8db2b397a3995072a2278125c6eeedaeb38c262774601479a521b3c0e5d9c1be280339a9a6ab91c578b6aee4bcb8c393883a69bc3b2071db43e0a8b2a24d34af61afcc3de03166859853d34cde734cbaa8f72cd8ce576a447200b1f53efde47aa142f3844845815545c9008aac9b2d7a9cb10c75ba7074fb64a00eac91bd2d13e7f283e31851b4f5684b5e9496e483beeb544725b2137d30de44c4ceea9d0e580de312cdbe9bbf610d92c9fe65681e3fe7111e578cbac04caae4053137423d410a17c2f8e31e484deceec9b34860cb99c8f56b548373818c29e788e9bcd1d588dae782082e59364e926fb808e0aebaef935a03865a4bd33e571a6d8cf43023cebce3d2b50a76785f363103b5434ca9b48273f4c63d911a6340f7d9a29759176437091fdf8fb26bf8d3f2828783399f01bc1b8f5d77010eabc27ba57f66df264688cd23eb65a3a970e6acd5c8853e69769c02863fba6535e7192455749dab4e74e09017054c2f325d6c9d305ff5f05167bbfe5be424d4ee130b6c7f27305050a3191fb155ffb22d82e5153b1b6426c9eb7429c9b114447e8c42f3588d4e566592aacbeac857b3a8860a15c6e0baae07896190827262884c9eac0508f5692e463135244f96ad45ce49a8f76aed0ce1479cfc4ed9b91ac05a21cf3f758bd4a57a10cf6db7c84aae8b14caa6a594bab9b46717a9cc0c91bace207874045e5b230d4a6335e1e7daab0c83ac4f525c613c2269e5bdad778fde44cc119fb3a069e80834d0f4afc2ee8d324fb21d97f65f9c93e2e90b4e99aca228919dc02e3dd2849cfc4c896a528134ac5dbc183aa084cf605f7438504a9d889cdaea1b946d154879f728509929d80bd7d70f9b491c628b5a020007b78b6560a8d77e205d1639b7ae7a6af4a70190b69966c9b9513ce0f4e3d8de83dbed76708e70628ec8dd6998d62b9b4067aae27aca16df163f37009b100e8ad7a3b820c2f81b86bc0a05dd9f29a9cc5515cab8e4de9268ad90b49197a9e2e341990a07214033e9b7a4fcaa39f52f8e7f31f20bceb6c36d2dd40b7057646665169369dcc7df6a588e749032c912c14a29768ba8511cdbb2427369c77a63f45c818c6da29bf8b667b1808a9e9f7e2d81a7b59095d72b30bbda52fb003481d02a3c483335701a5b363a0654c735246eca6c147df3e3f1ba0055c90fec8d7430574f0fc59e547204772aa42fd1a89d1d4246ed5bc016e8d30ceed0d8b9befdfc6a1d17d7bbf36e18cfe83ee17579f0920b20e6473dd0597bca01a7e050d8b86b95fa521f039e615ce26f39b71b063b6ba6026e40911fe0751d37564e1bd30e732e2180210f1862e33b348adde34e0ff09fa1dcf0e8521f65b8b71c00f62f07e4a7273a399fa6f8e9ffe7d5c004e13bc301959799bd34a4264825d208237425695858314536895af8b6c5bb2361d6ea0e324fdfeb1d854ee97f1f6e2f3e39537451cd9cd913f5efc8e0ba38dd980dab9918ab1839b270e5a1aed29f8d6ce63b7a7b5a61d051f0f9fb70306526a17b45513ee10593e2c184e402dbcfc10d7b9c3b179779a638c1036a2f04b42433f9d8d7653837ea71aad81f54ca86066bf31183dbefbe7c3904e2f972c08e39c0c1f3cef11adf0564ed42213667de9d7d095cd99d5ab993ea6662f63cf83f7a65edd505f4004dd354b0fb1d741c0fbd877c65afa3f74c0bc92efacb90b1a56c9695cb37c4c84a592ce7f0717f8550ec683e5010f7572c4250902a9e8516ce55b8a5a972d94f29cbef390dc1a35124b5b5e8ba1946dd820d0a4ba506b411023ca1f9a0c0aabf0214c0009f3a0ef6fcbbbf72e574e6d60800ad16a0d4a68a244ccf67e21fca669754bef2875776706fc97541f08edab2b51f5bf3a4ce5852ce4ac66215cafaac4d6c9e07b46629453cd67e05e1aa68d14be25bc12bdc72776c018b1f3ce7658d2221f7559cb5ada26e7b9f97ee3459f1a5d98669613fd1d55525a5e920922a9080545465359dd4c5bc8f6e42921e0b3a4e15767f49785c3dbba5d2a1772745b1d7ac76db21624c05082c07da1d2d5504c5eb28c7b57347194ce1652599a8f691520c21b10107b9608a5e2b93923655db9f064c9b00bf5abd66c66559d05c30de9e6a13a90cf49f2df71f2e70103f6d2c6f2c6a5195ef31dc093fbcf054611bb41d132ceac0c33e0b5f1e10af6dcee22be1122c22e4db6f98d3e00ace628416c3c6f053cd7b588cc28b1a7cd74c8a4704a036fab6dc873f4b3174abb004f223724c7254ff19edf32a5af2bfebcc6e222bf284f5f9ff6a2ce4689dac691414f948bc6967a9abaafce1a6ab3bde948eb401673617e71d7c70e68006894a3007df712b584a6b0a0f127062c10ce0639ced8c61d1444e60a6ce3aec5e0ab493d0ff10cd31d7fa634b542bfec9216fdd8ebebe57106d79465067002a3b25e0b282658cef369600e6093ecd1fb7d476a87498b40e8c1104ab74c7489a4a201f62835135e104f48fbc3626395be3cfc2326db6e97188d175a048eddfa75d0c0376053fba00c4dc656e0a0c409990bb229ff85967c0e64227b65074e478f6b4dbe731962d840df91c946360bf843c1e5bdf5adb420516807d6b006f5b1743c0264926da70d0906f07787fd86401e65c66c94acfa67f56bef906cefef667fbec5fac762e2440b38595340e61299f271091defbea0148697f077e5135202e76131dfd5ef54c5525289f3f93ede0aff5487ad90bb99591874bee3a6262e0ba292321aa5e493af800d8f8b589eb0a106b63ec5efba24bf328f202d7d6c2c02d89e95d56421ce1e04f65092ff4f3d67cc9d214140b740b6675a0f740b7de93f3c5a1f509d305180963f146a2803a84d7098db23d6dbd9f4a57833d071973e2df2e8546e9781f8e95e864f2d7ec4ef50baf372931cb0905a5288b92d9b6235822ffb655cb9689ac73e298432e70b1ff42a38946113c0c3633d1a9fadcef21c786ea95eeb70f397aad19c08c720b2e667a46b4d065b652499d3ae105f7a95be1a3bdd6b1c8e4ffedb9ac417fbc44da5d1577ab592e8ea20f366cd56970a3a73509aaf67316f4bfb0f29b36fa600b13c03baa4d5fa74563958350db04267fdf1e545ba54c6dfc7d0508e58664db2e8dbdd27a15ef90cd893bbfeefad863e16e54a8bdd4780058435eb45ad29eadd3b8696c68687dec0b448317f8378386a0da73dc0514031bf47da063b0e1aa0752284154ffa60591f75f66ea4db152ed70ba26e2e1bd20833d7d8bd12251e7895c4572ac009d63d5a737769e0361ab433fec79303190e9ac9657f83b3b29729b17844310f6765eca634b983885e644b8f5b84c4963c2ecca6371ee3a2760663003287cab56acc85b6ef9ab037e8e60d55fead6c3864a2ad5a470520d7aa0500f04eaf5725fe076a9224bc0d4fcd3f7cf31295253c953938bc5bb271d30896acdd1632b722705d5cdf137c5c67219a2fbd0662b03fbd1978682b53326f3585384fee3e005b1c26e973ca2fd5cc6de8c33da24f4b9bed9c166bef2c9ee44842ee6c40b0d7bb84fb274ea5a8cc8346250efe2f4e6e07f8666dbe1579aa94097761773808968257fed0fd5890e27ae9f1c0d6933e36a78215163db325866c24666dcd87acb9245cd1c1c258871b4c42429be4c1c72fc965df4", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) fsetxattr$security_smack_transmute(r6, &(0x7f0000001a40)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001a80)='TRUE', 0x4, 0x0) [ 110.638022][T10304] QAT: Invalid ioctl [ 110.658731][T10290] XFS (loop1): Mounting V4 Filesystem [ 110.694001][T10304] QAT: Invalid ioctl [ 110.728409][T10304] QAT: Invalid ioctl 23:27:19 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6=@initdev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000140)=0x362) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) [ 110.749241][T10290] XFS (loop1): empty log check failed [ 110.777729][T10307] QAT: Invalid ioctl [ 110.787178][T10290] XFS (loop1): log mount/recovery failed: error -5 [ 110.823855][T10314] ceph: device name is missing path (no : separator in /dev/loop3) [ 110.823931][T10307] QAT: Invalid ioctl 23:27:19 executing program 0: mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x1, 0x0) mq_unlink(&(0x7f0000000000)='\x00') [ 110.900926][T10324] QAT: Invalid ioctl [ 110.912755][T10290] XFS (loop1): log mount failed [ 110.971131][T10302] overlayfs: missing 'workdir' 23:27:19 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) syz_open_dev$evdev(&(0x7f0000001a00)='/dev/input/event#\x00', 0x3, 0x40280) [ 111.032371][T10326] ceph: device name is missing path (no : separator in /dev/loop5) [ 111.104446][T10322] overlayfs: missing 'workdir' 23:27:19 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2, 0x0}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000800)={r7, 0x1, 0x6}, 0x10) 23:27:19 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400100) ioctl$NBD_DISCONNECT(r0, 0xab08) sysfs$1(0xffffff1f, 0x0) [ 111.344518][T10344] QAT: Invalid ioctl 23:27:20 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0810460000180000000000329078ac141400ac1423bb860300000e00907800"/58], &(0x7f0000000000)={0x0, 0x0, [0x0, 0xcb, 0x91]}) [ 111.365967][T10344] QAT: Invalid ioctl 23:27:20 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) ioctl$KDSETKEYCODE(r6, 0x4b4d, &(0x7f00000019c0)={0x2f33, 0x75}) [ 111.411769][T10346] QAT: Invalid ioctl 23:27:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000280)=0x19b1, 0x4) 23:27:20 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/checkreqprot\x00', 0x408502, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xfffffffffffffffa, 0x200) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x400100, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000180)={0x1eb3}) futimesat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={{0x0, 0x2710}}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000540)='./file0\x00', 0xd151, 0x0, &(0x7f0000000640), 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="6e6f636f6d70726573732461756469742c736d61636b6673666c6f6f723d76666174002c736d61636b6602000000000000003c00000000000000000000000000f0e360b90eea6a9cfdc0444459979dc9555e85a1c503e155d1ee", @ANYRESDEC=r0, @ANYBLOB=',subj_role=vfat\x00,smackfsdef=,pcr=00000000000000000000,appraise,\x00']) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="756e695f786c6174653d312c0065691945277a3f992eebd7612a8a64ff485e7239f5547e535a3c116739cb9c58233f3e409b9d5810ef241ba82ad868f8fe464fb8d65f29b43b30fa749c16d1fba930ee24db2b95e87b858723dc0a26c8f7ef26a1ab37439fd84a14326cf0e77e8750338a4ab625dab399fe4296201a4b5dd0c71b323a4523b5d37d5a1bdf7ae09bbee96cad4267d2f6f7c7d85f"]) [ 111.474122][T10344] QAT: Invalid ioctl [ 111.491847][T10344] QAT: Invalid ioctl 23:27:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x200000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='sysfs\x00', r0}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:klogd_var_run_t:s0\x00\xcd:s\xd1\xf2z\x9f\xef\xa59\xa9H(\xc9\xef_\x03\xc6\xf4\xed\xf3\x14h\'\x94\xc7O\xac\xee\xe5\x8dN\x91G\x97\x99y\x99\xcf\xc4<\xfd\x83\x85\xe4\x01H\xeb\fA\xd7>\xbbK\x96\x99Y\xc2o\x8b\xfe\xc2\xa9~\xa7=g\x8aNr\x1f*D\xffJ\x94l\x02h\x8d\xe6\xb1Gr\x99\xff\x97\xf0\xba\xb6\xee6', 0x81, 0x0) [ 111.529204][T10344] QAT: Invalid ioctl 23:27:20 executing program 3: fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x1000000803e, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) 23:27:20 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x0, 0x0, 0x400000, 0x0, 0x10020000008, 0x0}, 0x2c) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400, 0x0) sendto(r0, &(0x7f00000000c0)="c999b8811a", 0x5, 0x40000, 0x0, 0x0) syz_read_part_table(0x0, 0xaaaaaaaaaaaa9a4, &(0x7f0000000000)=[{0x0}]) 23:27:20 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000007c0)='ip6gre0\x00') [ 111.675610][ T26] audit: type=1400 audit(1563233240.340:350): avc: denied { associate } for pid=10361 comm="syz-executor.0" name="/" dev="sysfs" ino=1 scontext=system_u:object_r:klogd_var_run_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=filesystem permissive=1 23:27:20 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000001980)) 23:27:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x81) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3f, &(0x7f00000000c0)=0x4) [ 111.936271][T10366] XFS (loop1): Mounting V4 Filesystem [ 111.963300][T10391] QAT: Invalid ioctl [ 111.981488][T10391] QAT: Invalid ioctl [ 112.007503][T10366] XFS (loop1): empty log check failed [ 112.013557][T10391] QAT: Invalid ioctl [ 112.049540][T10391] QAT: Invalid ioctl [ 112.059953][T10366] XFS (loop1): log mount/recovery failed: error -5 [ 112.081807][T10391] QAT: Invalid ioctl 23:27:20 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0xc0, 0x0) 23:27:20 executing program 3: fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x1000000803e, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) [ 112.101439][T10391] QAT: Invalid ioctl 23:27:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x81) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3f, &(0x7f00000000c0)=0x4) [ 112.162924][T10366] XFS (loop1): log mount failed 23:27:20 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000780)={0x2, 0x20, 0x6, 0x3, 0x100000000, 0x8}) [ 112.313155][T10414] QAT: Invalid ioctl [ 112.351944][T10414] QAT: Invalid ioctl [ 112.439500][T10420] QAT: Invalid ioctl [ 112.488787][T10414] QAT: Invalid ioctl 23:27:21 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x0, 0x0, 0x400000, 0x0, 0x10020000008, 0x0}, 0x2c) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400, 0x0) sendto(r0, &(0x7f00000000c0)="c999b8811a", 0x5, 0x40000, 0x0, 0x0) syz_read_part_table(0x0, 0xaaaaaaaaaaaa9a4, &(0x7f0000000000)=[{0x0}]) 23:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x81) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3f, &(0x7f00000000c0)=0x4) 23:27:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x200a00) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x1d3d19c1ac898279) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000001c0)={0x3f, 0x6, 0x81, 0x4, 0x8, 0x6000000000}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffffffffffff72e0, 0x200442) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f00000000c0)=""/172, &(0x7f0000000040)=0xac) unshare(0x40600) r2 = timerfd_create(0x0, 0x0) timerfd_gettime(r2, &(0x7f0000000080)) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000240)=0x28e) 23:27:21 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="0b97e0ba5a81e510ddfa510c80c0223f4a2e12f59e432e5f91e5b561a6b28850c72ac2a379dff5fde492749f34b14dc3d3f109272d6bc7c9c7f384be4f919b862fdf02613e38210714cabc9c70184d88085cd2b1ba392fa35b196cc1dedef291806c89e620c394a3a2ca75340db31b58103e771dc72e5c7566c5e019c54359a6d9f873edb399945ca95a35944baab21ba6b219f02cd7cc4451f8c649d0dd93db08b652a74795951de85af458f66e1c0cd7c60de6fd1b324d9b6cab982d5de11b41b0e9cf28d750207fb198e64b5aed8e2ec295923b36e73f078a016af4b27e2a07da69f7012982e4bbc9f98f57fe2c946169b8d9c633a574b65d824c977d516d252f1171fa8ddd3d2bd16b8043ce9685425a2541f045b6ca19770a64f764009a80cc1f0a96adf3a9e71f53709d5ab4763e330de643d0d5801cf024f1c672a6487c54801760f66d263ab453580a80cd2c3b210a838d12da75daa49767c0e316a282e5258f1e85759bc69ea5869936526438f21a4bc93ab3e9b3648633ff75024fec4b5d1f5e883ea95d065599f644413369e474b7a2581e85bf297e8f12fb52fbb884b1bd309e0976671067566a08d20c25778cc87ae2cee799a973215477855d20bc777dfbd777d11085e2310527b156852e935e1e6024447daad0b5b136aaee91c1c9e85dabf932fb78992ca10fa21f45afe5ac033924b8ef194392d7fffcfed1487bf0fa7af0e8f8fb5390e52f5287b59af7ae2068aceaae51b2925ddf64dc7b29eb7bdddff94a4a1397c2ac570c57de102e01a773d04cb0225b3ee1b60a32dacddbdaa67c2eb728ea8343418133482d9d9b7ef11f0b2d82cea828c234c9d9c31cdb65047223b86f2cb11728e32261d095dbc3d24ce506807c004b392186198efa96942bbf37977b2704bbe54d38d641f5728a8a2552069de1c4a42b91ca70136c45b2efc46032507bc5efa760835b588a366bf760426490d3d145345d995278af5ead8c0e8671b10fde81d46fd0959b97d93eac584ddd97f19fa7755fcd8b4ef91b46f8b3bdce9fb33e1c60635150a0abb1f5c029ef4a2ac2c26a0934eaaad697572c4299570d13e3723901f40cd3c5df2e790b2dc88b54a39381eec64a93389e6a208571882c9b4638feec4a6d929f11bb26b2c51e00d44c7d8c752b81143248082f2a2a578b15a9b1b33c0e4b6b9c92a6a10d4cf0e515ab371ac193ef59773f0f960bce5c36feee4fecf759ba0c33e85ecbaabb3c3c2f7990a97b297da32df09f7171c6f5cc26d4ec9ea6ee98c54d9ce1d964003f5488a018ca2d8b95b52bc10cd380f74c8dbaf139ce25f8bd06911df0d2c5c9393bd7e7e386d2be0206407d1a55f16cfb0903355a6b7b86c2d24492fa28e740f839d63843ddf7d7bfbce1f8b637c6ea02aae4ec8a95ebb692366fc2b0be9f16397cf71e425017b25f0ad55269e294c9a0575a92182d72db4110226260d10f1080f1b68705c6b186512c903c5c2a5182fed91136d598a8a01cd0c2cbfc8981aab505d66cfbe9349739fe5368fa19d2abf71a796e781e9b174ac6c318f40c694fe247a5593c88b2380c1cb41883a11cfe34e8e0683b1c49131aa4f36fed30feb8b90a88b081accb5b3636351e643baaa4058750c73c3d0088815cb35bf147e54112a6ee8112ce55b12072922976885593b8683e0be35a4c61d3c253c63ffef38c24ce5b6219fc03eed181226d83f445e981a96888ff0b69f41fd29b1b41eda1d6737c850481938c01a051cdda2726e71fd87460daf3282a30ad00b15482415c19f09f8ba991b526b527a5a3b5759f82004989f8bd0deab09b0db7950cbe6042d72d302b2cd74c8a0c2eb9bf800fece0958132009409da36821cecc36a7b09829e6095cab0de4af8752b6bc9de12f53c3e7855b914885c4d86e7daaa055eba43c1f622dc3bd9825386c2205d1a4436a5c15cf62a17923d7dbe0cd1fce2918fcee58a898c74ea29e294a653435e8f73a186e45451c0af6ef738eed547f1451600c9a5dad4cd53b168819cb3a4bc8b1c713ccd2850a0344fdca01dbd0439cb84d44579cd137525a5ed3cba4b01635c4bcd4fc323bcab4e1156befb046981382daf8226b123f9317a34e7984dc23b8db2b397a3995072a2278125c6eeedaeb38c262774601479a521b3c0e5d9c1be280339a9a6ab91c578b6aee4bcb8c393883a69bc3b2071db43e0a8b2a24d34af61afcc3de03166859853d34cde734cbaa8f72cd8ce576a447200b1f53efde47aa142f3844845815545c9008aac9b2d7a9cb10c75ba7074fb64a00eac91bd2d13e7f283e31851b4f5684b5e9496e483beeb544725b2137d30de44c4ceea9d0e580de312cdbe9bbf610d92c9fe65681e3fe7111e578cbac04caae4053137423d410a17c2f8e31e484deceec9b34860cb99c8f56b548373818c29e788e9bcd1d588dae782082e59364e926fb808e0aebaef935a03865a4bd33e571a6d8cf43023cebce3d2b50a76785f363103b5434ca9b48273f4c63d911a6340f7d9a29759176437091fdf8fb26bf8d3f2828783399f01bc1b8f5d77010eabc27ba57f66df264688cd23eb65a3a970e6acd5c8853e69769c02863fba6535e7192455749dab4e74e09017054c2f325d6c9d305ff5f05167bbfe5be424d4ee130b6c7f27305050a3191fb155ffb22d82e5153b1b6426c9eb7429c9b114447e8c42f3588d4e566592aacbeac857b3a8860a15c6e0baae07896190827262884c9eac0508f5692e463135244f96ad45ce49a8f76aed0ce1479cfc4ed9b91ac05a21cf3f758bd4a57a10cf6db7c84aae8b14caa6a594bab9b46717a9cc0c91bace207874045e5b230d4a6335e1e7daab0c83ac4f525c613c2269e5bdad778fde44cc119fb3a069e80834d0f4afc2ee8d324fb21d97f65f9c93e2e90b4e99aca228919dc02e3dd2849cfc4c896a528134ac5dbc183aa084cf605f7438504a9d889cdaea1b946d154879f728509929d80bd7d70f9b491c628b5a020007b78b6560a8d77e205d1639b7ae7a6af4a70190b69966c9b9513ce0f4e3d8de83dbed76708e70628ec8dd6998d62b9b4067aae27aca16df163f37009b100e8ad7a3b820c2f81b86bc0a05dd9f29a9cc5515cab8e4de9268ad90b49197a9e2e341990a07214033e9b7a4fcaa39f52f8e7f31f20bceb6c36d2dd40b7057646665169369dcc7df6a588e749032c912c14a29768ba8511cdbb2427369c77a63f45c818c6da29bf8b667b1808a9e9f7e2d81a7b59095d72b30bbda52fb003481d02a3c483335701a5b363a0654c735246eca6c147df3e3f1ba0055c90fec8d7430574f0fc59e547204772aa42fd1a89d1d4246ed5bc016e8d30ceed0d8b9befdfc6a1d17d7bbf36e18cfe83ee17579f0920b20e6473dd0597bca01a7e050d8b86b95fa521f039e615ce26f39b71b063b6ba6026e40911fe0751d37564e1bd30e732e2180210f1862e33b348adde34e0ff09fa1dcf0e8521f65b8b71c00f62f07e4a7273a399fa6f8e9ffe7d5c004e13bc301959799bd34a4264825d208237425695858314536895af8b6c5bb2361d6ea0e324fdfeb1d854ee97f1f6e2f3e39537451cd9cd913f5efc8e0ba38dd980dab9918ab1839b270e5a1aed29f8d6ce63b7a7b5a61d051f0f9fb70306526a17b45513ee10593e2c184e402dbcfc10d7b9c3b179779a638c1036a2f04b42433f9d8d7653837ea71aad81f54ca86066bf31183dbefbe7c3904e2f972c08e39c0c1f3cef11adf0564ed42213667de9d7d095cd99d5ab993ea6662f63cf83f7a65edd505f4004dd354b0fb1d741c0fbd877c65afa3f74c0bc92efacb90b1a56c9695cb37c4c84a592ce7f0717f8550ec683e5010f7572c4250902a9e8516ce55b8a5a972d94f29cbef390dc1a35124b5b5e8ba1946dd820d0a4ba506b411023ca1f9a0c0aabf0214c0009f3a0ef6fcbbbf72e574e6d60800ad16a0d4a68a244ccf67e21fca669754bef2875776706fc97541f08edab2b51f5bf3a4ce5852ce4ac66215cafaac4d6c9e07b46629453cd67e05e1aa68d14be25bc12bdc72776c018b1f3ce7658d2221f7559cb5ada26e7b9f97ee3459f1a5d98669613fd1d55525a5e920922a9080545465359dd4c5bc8f6e42921e0b3a4e15767f49785c3dbba5d2a1772745b1d7ac76db21624c05082c07da1d2d5504c5eb28c7b57347194ce1652599a8f691520c21b10107b9608a5e2b93923655db9f064c9b00bf5abd66c66559d05c30de9e6a13a90cf49f2df71f2e70103f6d2c6f2c6a5195ef31dc093fbcf054611bb41d132ceac0c33e0b5f1e10af6dcee22be1122c22e4db6f98d3e00ace628416c3c6f053cd7b588cc28b1a7cd74c8a4704a036fab6dc873f4b3174abb004f223724c7254ff19edf32a5af2bfebcc6e222bf284f5f9ff6a2ce4689dac691414f948bc6967a9abaafce1a6ab3bde948eb401673617e71d7c70e68006894a3007df712b584a6b0a0f127062c10ce0639ced8c61d1444e60a6ce3aec5e0ab493d0ff10cd31d7fa634b542bfec9216fdd8ebebe57106d79465067002a3b25e0b282658cef369600e6093ecd1fb7d476a87498b40e8c1104ab74c7489a4a201f62835135e104f48fbc3626395be3cfc2326db6e97188d175a048eddfa75d0c0376053fba00c4dc656e0a0c409990bb229ff85967c0e64227b65074e478f6b4dbe731962d840df91c946360bf843c1e5bdf5adb420516807d6b006f5b1743c0264926da70d0906f07787fd86401e65c66c94acfa67f56bef906cefef667fbec5fac762e2440b38595340e61299f271091defbea0148697f077e5135202e76131dfd5ef54c5525289f3f93ede0aff5487ad90bb99591874bee3a6262e0ba292321aa5e493af800d8f8b589eb0a106b63ec5efba24bf328f202d7d6c2c02d89e95d56421ce1e04f65092ff4f3d67cc9d214140b740b6675a0f740b7de93f3c5a1f509d305180963f146a2803a84d7098db23d6dbd9f4a57833d071973e2df2e8546e9781f8e95e864f2d7ec4ef50baf372931cb0905a5288b92d9b6235822ffb655cb9689ac73e298432e70b1ff42a38946113c0c3633d1a9fadcef21c786ea95eeb70f397aad19c08c720b2e667a46b4d065b652499d3ae105f7a95be1a3bdd6b1c8e4ffedb9ac417fbc44da5d1577ab592e8ea20f366cd56970a3a73509aaf67316f4bfb0f29b36fa600b13c03baa4d5fa74563958350db04267fdf1e545ba54c6dfc7d0508e58664db2e8dbdd27a15ef90cd893bbfeefad863e16e54a8bdd4780058435eb45ad29eadd3b8696c68687dec0b448317f8378386a0da73dc0514031bf47da063b0e1aa0752284154ffa60591f75f66ea4db152ed70ba26e2e1bd20833d7d8bd12251e7895c4572ac009d63d5a737769e0361ab433fec79303190e9ac9657f83b3b29729b17844310f6765eca634b983885e644b8f5b84c4963c2ecca6371ee3a2760663003287cab56acc85b6ef9ab037e8e60d55fead6c3864a2ad5a470520d7aa0500f04eaf5725fe076a9224bc0d4fcd3f7cf31295253c953938bc5bb271d30896acdd1632b722705d5cdf137c5c67219a2fbd0662b03fbd1978682b53326f3585384fee3e005b1c26e973ca2fd5cc6de8c33da24f4b9bed9c166bef2c9ee44842ee6c40b0d7bb84fb274ea5a8cc8346250efe2f4e6e07f8666dbe1579aa94097761773808968257fed0fd5890e27ae9f1c0d6933e36a78215163db325866c24666dcd87acb9245cd1c1c258871b4c42429be4c1c72fc965df4", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) openat$userio(0xffffffffffffff9c, &(0x7f0000001900)='/dev/userio\x00', 0x200000, 0x0) [ 112.562993][T10414] QAT: Invalid ioctl 23:27:21 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000740)=0x9de, 0x4) 23:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x81) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3f, &(0x7f00000000c0)=0x4) 23:27:21 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000018c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001880)={&(0x7f0000001780)={0xf4, r4, 0x1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x43e, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7b74, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) [ 112.797895][T10443] QAT: Invalid ioctl [ 112.811420][T10443] QAT: Invalid ioctl [ 112.856061][T10443] QAT: Invalid ioctl 23:27:21 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10800, 0x102) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000080)={0xf86f, 0x9, 0x0, 0x0, 0x100000001, 0x4, 0x101, 0x2581, 0x14, 0x5, 0x9, 0x8, 0x0, 0xffffffff, 0x0, 0x200, 0x759, 0xfffffffffffffff8, 0x1}) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004500003000ba75f4a4a46d5a2b0000fcd7019078ac7014bbac1414000802907800"/62], 0x0) [ 112.883243][T10443] QAT: Invalid ioctl [ 112.893083][T10438] XFS (loop1): Mounting V4 Filesystem 23:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x81) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:21 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x11af, 0x8}, 0x10) [ 112.970980][T10438] XFS (loop1): empty log check failed [ 112.985787][T10438] XFS (loop1): log mount/recovery failed: error -5 23:27:21 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) rt_sigqueueinfo(r5, 0x12, &(0x7f00000016c0)={0x30, 0x6, 0xffffffffffffffe0}) [ 113.082946][T10438] XFS (loop1): log mount failed [ 113.197395][T10472] QAT: Invalid ioctl [ 113.214090][T10472] QAT: Invalid ioctl [ 113.266204][T10475] QAT: Invalid ioctl 23:27:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xffffffffffffff80, 0x7, [@restrict={0x3, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000cc0)=""/191, 0x2b, 0xbf, 0x1}, 0x20) 23:27:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000280), 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0xcff9, 0x4) 23:27:22 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)) [ 113.305179][T10472] QAT: Invalid ioctl 23:27:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:22 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) 23:27:22 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000001640)={0x8, 0x9, 0x2, 0x7}) [ 113.504443][T10489] QAT: Invalid ioctl [ 113.545916][T10489] QAT: Invalid ioctl 23:27:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000280), 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0xcff9, 0x4) [ 113.592076][T10495] QAT: Invalid ioctl 23:27:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) [ 113.616054][T10489] QAT: Invalid ioctl 23:27:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:22 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r6}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r5, 0x1}, 0x8) [ 113.735021][T10496] XFS (loop1): Mounting V4 Filesystem 23:27:22 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xd0, r4, 0x215, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb9e}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 23:27:22 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{0x5, 0x6}, {0x3, 0xa30}, {0x7fff, 0x9}, {0xfffffffffffffffb, 0xff}, {0x1, 0xff}, {0x15fbbd49, 0x9}]}) move_pages(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000/0x4000)=nil], &(0x7f0000000000)=[0x1], &(0x7f0000000240), 0x0) [ 113.798019][T10496] XFS (loop1): empty log check failed [ 113.822224][T10496] XFS (loop1): log mount/recovery failed: error -5 [ 113.885208][T10521] QAT: Invalid ioctl 23:27:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) [ 113.910748][T10521] QAT: Invalid ioctl [ 113.915598][T10496] XFS (loop1): log mount failed [ 113.936528][T10521] QAT: Invalid ioctl [ 113.942374][T10521] QAT: Invalid ioctl [ 114.021211][T10517] XFS (loop0): Mounting V4 Filesystem 23:27:22 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r4, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r5}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000005c0)=""/32) [ 114.101768][T10517] XFS (loop0): empty log check failed [ 114.117563][T10517] XFS (loop0): log mount/recovery failed: error -5 [ 114.203976][T10542] QAT: Invalid ioctl [ 114.219129][T10542] QAT: Invalid ioctl [ 114.234804][T10542] QAT: Invalid ioctl [ 114.242911][T10517] XFS (loop0): log mount failed [ 114.276036][T10542] QAT: Invalid ioctl 23:27:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") 23:27:23 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{0x5, 0x6}, {0x3, 0xa30}, {0x7fff, 0x9}, {0xfffffffffffffffb, 0xff}, {0x1, 0xff}, {0x15fbbd49, 0x9}]}) move_pages(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000/0x4000)=nil], &(0x7f0000000000)=[0x1], &(0x7f0000000240), 0x0) 23:27:23 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') 23:27:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:23 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r4}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000580), 0x4) 23:27:23 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) pwrite64(r3, &(0x7f0000000440)="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", 0x1000, 0x0) [ 114.517739][T10556] QAT: Invalid ioctl [ 114.540651][T10556] QAT: Invalid ioctl [ 114.568090][T10556] QAT: Invalid ioctl [ 114.583755][T10556] QAT: Invalid ioctl [ 114.590236][T10557] XFS (loop1): Mounting V4 Filesystem [ 114.666738][T10557] XFS (loop1): empty log check failed [ 114.709444][T10557] XFS (loop1): log mount/recovery failed: error -5 23:27:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:23 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) getsockopt$inet_buf(r0, 0x0, 0x3e, &(0x7f0000000340)=""/190, &(0x7f0000000400)=0xbe) 23:27:23 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r4}, 0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@mcast2}, &(0x7f0000000540)=0x14) [ 114.801306][T10557] XFS (loop1): log mount failed [ 114.912843][T10586] QAT: Invalid ioctl 23:27:23 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x3, 0x6, 0x4}) [ 114.934269][T10586] QAT: Invalid ioctl [ 114.943561][T10583] XFS (loop3): Mounting V4 Filesystem [ 114.953597][T10586] QAT: Invalid ioctl [ 114.970027][T10586] QAT: Invalid ioctl [ 115.006256][T10594] XFS (loop0): Mounting V4 Filesystem [ 115.031123][T10583] XFS (loop3): empty log check failed [ 115.042307][T10583] XFS (loop3): log mount/recovery failed: error -5 [ 115.062513][T10594] XFS (loop0): empty log check failed [ 115.080731][T10594] XFS (loop0): log mount/recovery failed: error -5 [ 115.142830][T10583] XFS (loop3): log mount failed [ 115.182674][T10594] XFS (loop0): log mount failed 23:27:23 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:23 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000004c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r4}, 0x14) 23:27:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) [ 115.254217][T10615] QAT: Invalid ioctl 23:27:24 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) [ 115.292215][T10615] QAT: Invalid ioctl [ 115.337503][T10615] QAT: Invalid ioctl 23:27:24 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) [ 115.360727][T10615] QAT: Invalid ioctl 23:27:24 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) getpeername$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) [ 115.470583][T10620] XFS (loop1): Mounting V4 Filesystem [ 115.531760][T10620] XFS (loop1): empty log check failed [ 115.595078][T10620] XFS (loop1): log mount/recovery failed: error -5 [ 115.707387][T10640] QAT: Invalid ioctl [ 115.712974][T10620] XFS (loop1): log mount failed 23:27:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:24 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0x1, 0x1000, 0x8, 0x7fffffff}, &(0x7f00000002c0)=0x14) 23:27:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:24 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) [ 115.752140][T10640] QAT: Invalid ioctl [ 115.805804][T10650] QAT: Invalid ioctl [ 115.814266][T10640] QAT: Invalid ioctl [ 115.903833][T10647] XFS (loop3): Mounting V4 Filesystem 23:27:24 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0xfffffffffffffff9, &(0x7f0000ffe000/0x1000)=nil, 0x1) 23:27:24 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240), 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) 23:27:24 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) [ 115.980066][T10647] XFS (loop3): empty log check failed [ 115.993798][T10647] XFS (loop3): log mount/recovery failed: error -5 [ 116.009310][T10659] XFS (loop0): Mounting V4 Filesystem [ 116.096187][T10659] XFS (loop0): empty log check failed [ 116.103110][T10647] XFS (loop3): log mount failed [ 116.137310][T10678] QAT: Invalid ioctl [ 116.153212][T10659] XFS (loop0): log mount/recovery failed: error -5 [ 116.176292][T10678] QAT: Invalid ioctl 23:27:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:24 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) [ 116.200396][T10678] QAT: Invalid ioctl [ 116.218937][T10678] QAT: Invalid ioctl [ 116.332899][T10659] XFS (loop0): log mount failed 23:27:25 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) 23:27:25 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) [ 116.547425][T10688] XFS (loop1): Mounting V4 Filesystem [ 116.562675][T10701] QAT: Invalid ioctl [ 116.579667][T10701] QAT: Invalid ioctl [ 116.588122][T10701] QAT: Invalid ioctl [ 116.649686][T10701] QAT: Invalid ioctl [ 116.663918][T10688] XFS (loop1): empty log check failed [ 116.712639][T10688] XFS (loop1): log mount/recovery failed: error -5 [ 116.772668][T10688] XFS (loop1): log mount failed 23:27:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) 23:27:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") 23:27:25 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000002c0)={{0x2, 0x43b8}, 'port0\x00', 0xa3, 0x10000, 0x400040000000, 0x2, 0x0, 0x6, 0x6, 0x0, 0x4, 0x63f8}) 23:27:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2) 23:27:25 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) [ 116.959401][T10719] QAT: Invalid ioctl [ 116.983953][T10719] QAT: Invalid ioctl [ 116.999343][T10719] QAT: Invalid ioctl [ 117.015952][T10719] QAT: Invalid ioctl [ 117.064520][T10720] XFS (loop3): Mounting V4 Filesystem 23:27:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) 23:27:25 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) [ 117.107835][T10725] XFS (loop0): Mounting V4 Filesystem [ 117.132292][T10720] XFS (loop3): empty log check failed [ 117.151868][T10725] XFS (loop0): empty log check failed [ 117.162578][T10720] XFS (loop3): log mount/recovery failed: error -5 [ 117.230729][T10725] XFS (loop0): log mount/recovery failed: error -5 [ 117.238350][T10748] QAT: Invalid ioctl 23:27:25 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:25 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:26 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) [ 117.283454][T10748] QAT: Invalid ioctl [ 117.302592][T10720] XFS (loop3): log mount failed [ 117.321632][T10748] QAT: Invalid ioctl [ 117.346342][T10725] XFS (loop0): log mount failed 23:27:26 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x0, &(0x7f0000000340)=""/103, 0x67) 23:27:26 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffff, @empty}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0445f397b55db0ad10b94ae72b90771c", 0x4}, @in6={0xa, 0x4e21, 0x100000001, @rand_addr="5558a566cac9167f0235b987a0f99f1f", 0x3ff}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000200)=0x10) [ 117.539154][T10763] QAT: Invalid ioctl 23:27:26 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) [ 117.575658][T10763] QAT: Invalid ioctl [ 117.605100][T10763] QAT: Invalid ioctl 23:27:26 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:26 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x0, &(0x7f0000000340)=""/103, 0x67) 23:27:26 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) 23:27:26 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) 23:27:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) 23:27:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") [ 117.948969][T10779] QAT: Invalid ioctl 23:27:26 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x0, &(0x7f0000000340)=""/103, 0x67) [ 117.977034][T10779] QAT: Invalid ioctl [ 117.985201][T10779] QAT: Invalid ioctl 23:27:26 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xcb) 23:27:26 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x8a6) 23:27:26 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 118.202124][T10793] XFS (loop3): Mounting V4 Filesystem [ 118.209733][T10789] XFS (loop0): Mounting V4 Filesystem 23:27:27 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0xcb) [ 118.273548][T10789] XFS (loop0): empty log check failed [ 118.294038][T10793] XFS (loop3): empty log check failed [ 118.300340][T10816] QAT: Invalid ioctl 23:27:27 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x2, 0x0, 0x0) [ 118.355049][T10789] XFS (loop0): log mount/recovery failed: error -5 [ 118.373424][T10793] XFS (loop3): log mount/recovery failed: error -5 [ 118.385275][T10816] QAT: Invalid ioctl 23:27:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 118.463031][T10789] XFS (loop0): log mount failed 23:27:27 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10440, 0x0) [ 118.492687][T10793] XFS (loop3): log mount failed 23:27:27 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0xcb) 23:27:27 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x2, 0x0, 0x0) [ 118.626790][T10835] QAT: Invalid ioctl 23:27:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") 23:27:27 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) ioctl$TIOCSIG(r2, 0x40045436, 0x24) 23:27:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:27 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0xcb) 23:27:27 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) syslog(0x2, 0x0, 0x0) [ 119.015946][T10853] QAT: Invalid ioctl 23:27:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") 23:27:27 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:27 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x401, 0x1, 0xffffffff, 0x5}, 0x10) 23:27:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 119.249645][T10866] XFS (loop0): Mounting V4 Filesystem [ 119.315424][T10862] XFS (loop3): Mounting V4 Filesystem [ 119.354734][T10866] XFS (loop0): empty log check failed [ 119.392608][T10862] XFS (loop3): empty log check failed [ 119.402808][T10887] XFS (loop5): Mounting V4 Filesystem [ 119.408421][T10866] XFS (loop0): log mount/recovery failed: error -5 23:27:28 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0xc}}}, 0x8, 0x5}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, &(0x7f00000001c0)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000, 0x7, 0x80000000, 0x7, 0x4, 0x7fff}) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) 23:27:28 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) [ 119.453432][T10862] XFS (loop3): log mount/recovery failed: error -5 [ 119.507134][T10887] XFS (loop5): empty log check failed [ 119.523543][T10866] XFS (loop0): log mount failed [ 119.526422][T10887] XFS (loop5): log mount/recovery failed: error -5 [ 119.528868][T10862] XFS (loop3): log mount failed [ 119.682627][T10887] XFS (loop5): log mount failed 23:27:28 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) 23:27:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 23:27:28 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = getpid() tgkill(r0, r1, 0x25) 23:27:28 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) tgkill(r0, 0x0, 0x25) 23:27:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") 23:27:28 executing program 2 (fault-call:0 fault-nth:0): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 120.191877][T10933] XFS (loop3): Mounting V4 Filesystem [ 120.236172][T10927] XFS (loop1): Invalid superblock magic number [ 120.248563][T10953] FAULT_INJECTION: forcing a failure. [ 120.248563][T10953] name failslab, interval 1, probability 0, space 0, times 1 [ 120.286151][T10933] XFS (loop3): empty log check failed [ 120.305528][T10933] XFS (loop3): log mount/recovery failed: error -5 [ 120.354451][T10953] CPU: 1 PID: 10953 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 120.362134][T10953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.372216][T10953] Call Trace: [ 120.375541][T10953] dump_stack+0x172/0x1f0 [ 120.379919][T10953] should_fail.cold+0xa/0x15 [ 120.384666][T10953] ? fault_create_debugfs_attr+0x180/0x180 [ 120.390504][T10953] ? ___might_sleep+0x163/0x280 [ 120.395383][T10953] __should_failslab+0x121/0x190 [ 120.400351][T10953] should_failslab+0x9/0x14 [ 120.404881][T10953] kmem_cache_alloc+0x2aa/0x710 [ 120.409755][T10953] ? __kasan_check_write+0x14/0x20 [ 120.414888][T10953] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 120.420466][T10953] getname_flags+0xd6/0x5b0 [ 120.424992][T10953] getname+0x1a/0x20 [ 120.428908][T10953] do_sys_open+0x2c9/0x5d0 [ 120.433349][T10953] ? filp_open+0x80/0x80 [ 120.437625][T10953] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 120.443112][T10953] ? do_syscall_64+0x26/0x6a0 [ 120.447808][T10953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 120.453895][T10953] ? do_syscall_64+0x26/0x6a0 [ 120.458778][T10953] __x64_sys_open+0x7e/0xc0 [ 120.463304][T10953] do_syscall_64+0xfd/0x6a0 [ 120.467827][T10953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 120.473727][T10953] RIP: 0033:0x413701 [ 120.477639][T10953] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 23:27:29 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 120.497249][T10953] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 120.505679][T10953] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 120.513752][T10953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 120.521737][T10953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 120.529724][T10953] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 120.537801][T10953] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:29 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) tgkill(r0, 0x0, 0x25) [ 120.585415][T10933] XFS (loop3): log mount failed 23:27:29 executing program 2 (fault-call:0 fault-nth:1): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 120.681030][T10963] XFS (loop5): Mounting V4 Filesystem [ 120.708996][T10963] XFS (loop5): empty log check failed [ 120.714899][T10963] XFS (loop5): log mount/recovery failed: error -5 23:27:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:29 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 120.802836][T10963] XFS (loop5): log mount failed [ 120.837718][T10985] FAULT_INJECTION: forcing a failure. [ 120.837718][T10985] name failslab, interval 1, probability 0, space 0, times 0 [ 120.923197][T10985] CPU: 1 PID: 10985 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 120.930890][T10985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.940964][T10985] Call Trace: [ 120.944273][T10985] dump_stack+0x172/0x1f0 [ 120.948634][T10985] should_fail.cold+0xa/0x15 [ 120.953257][T10985] ? fault_create_debugfs_attr+0x180/0x180 [ 120.959094][T10985] ? ___might_sleep+0x163/0x280 [ 120.963959][T10985] __should_failslab+0x121/0x190 [ 120.968905][T10985] should_failslab+0x9/0x14 [ 120.968925][T10985] kmem_cache_alloc+0x2aa/0x710 [ 120.968945][T10985] ? stack_trace_save+0xac/0xe0 [ 120.968963][T10985] ? stack_trace_consume_entry+0x190/0x190 [ 120.968983][T10985] __alloc_file+0x27/0x300 [ 120.968998][T10985] alloc_empty_file+0x72/0x170 [ 120.998270][T10985] path_openat+0xef/0x46d0 [ 121.003039][T10985] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 121.008856][T10985] ? kasan_slab_alloc+0xf/0x20 [ 121.013721][T10985] ? kmem_cache_alloc+0x121/0x710 [ 121.018751][T10985] ? getname_flags+0xd6/0x5b0 [ 121.018765][T10985] ? getname+0x1a/0x20 [ 121.018781][T10985] ? do_sys_open+0x2c9/0x5d0 [ 121.018803][T10985] ? __kasan_check_read+0x11/0x20 [ 121.018821][T10985] ? __kasan_check_read+0x11/0x20 [ 121.018846][T10985] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 121.048037][T10985] ? __alloc_fd+0x487/0x620 [ 121.048063][T10985] do_filp_open+0x1a1/0x280 [ 121.048081][T10985] ? may_open_dev+0x100/0x100 [ 121.048100][T10985] ? lock_downgrade+0x920/0x920 [ 121.048121][T10985] ? rwlock_bug.part.0+0x90/0x90 [ 121.077647][T10985] ? __kasan_check_read+0x11/0x20 [ 121.082693][T10985] ? do_raw_spin_unlock+0x57/0x270 [ 121.087824][T10985] ? _raw_spin_unlock+0x2d/0x50 [ 121.092688][T10985] ? __alloc_fd+0x487/0x620 [ 121.097236][T10985] do_sys_open+0x3fe/0x5d0 [ 121.101685][T10985] ? filp_open+0x80/0x80 [ 121.105951][T10985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 121.111435][T10985] ? do_syscall_64+0x26/0x6a0 [ 121.116126][T10985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 121.117974][T10992] XFS (loop1): Invalid superblock magic number [ 121.122208][T10985] ? do_syscall_64+0x26/0x6a0 [ 121.122235][T10985] __x64_sys_open+0x7e/0xc0 [ 121.122254][T10985] do_syscall_64+0xfd/0x6a0 [ 121.122274][T10985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 121.122293][T10985] RIP: 0033:0x413701 [ 121.151898][T10985] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 23:27:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) 23:27:29 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) tgkill(r0, 0x0, 0x25) [ 121.171523][T10985] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 121.181417][T10985] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 121.189407][T10985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 121.197392][T10985] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 121.205384][T10985] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 121.213377][T10985] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:30 executing program 4: r0 = getpid() tgkill(0x0, r0, 0x25) 23:27:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 121.415456][T11005] XFS (loop3): Mounting V4 Filesystem [ 121.452923][T11005] XFS (loop3): empty log check failed 23:27:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000180)="6eed3287522edf7991472b92ae5e40f8303f582276e7d0db45ece52f45105200f625790f901e6d232db8e0da2e873664c5a9d7182e1aaeeb14992583ac44b025b7ce4200cd5e272ce387f4ba3de4f6b05872767e611c574448e0db104a2e5b6dc89ac5aa6f8beedd688032d4809b060ebc62682adc936902a56efd9aafd135aba2c9823031441061ec83de6aa8bd1b820e09a7b38fac56e83dfa3abcd02de7efd139356ab6bc6815830621313c8c4db37380435895c11e2380af4030c98bd92857f00ad920b5397f71f42efbb4eaf9dd38c043df01e4d8c8ba11ad0c3b2109d9cd95eed29f268bf540dac3e085f07237be057c3aa68037a3") 23:27:30 executing program 2 (fault-call:0 fault-nth:2): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 121.472976][T11005] XFS (loop3): log mount/recovery failed: error -5 [ 121.533056][T11005] XFS (loop3): log mount failed 23:27:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:30 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 121.765609][T11030] XFS (loop5): Mounting V4 Filesystem [ 121.787796][T11030] XFS (loop5): empty log check failed [ 121.808853][T11030] XFS (loop5): log mount/recovery failed: error -5 [ 121.846354][T11051] FAULT_INJECTION: forcing a failure. [ 121.846354][T11051] name failslab, interval 1, probability 0, space 0, times 0 [ 121.868717][T11039] XFS (loop1): Invalid superblock magic number [ 121.875507][T11030] XFS (loop5): log mount failed [ 121.892680][T11051] CPU: 1 PID: 11051 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 121.900367][T11051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.910432][T11051] Call Trace: [ 121.913952][T11051] dump_stack+0x172/0x1f0 [ 121.918396][T11051] should_fail.cold+0xa/0x15 [ 121.923010][T11051] ? fault_create_debugfs_attr+0x180/0x180 [ 121.928849][T11051] ? ___might_sleep+0x163/0x280 [ 121.933724][T11051] __should_failslab+0x121/0x190 [ 121.938682][T11051] should_failslab+0x9/0x14 [ 121.943229][T11051] kmem_cache_alloc+0x2aa/0x710 [ 121.948103][T11051] ? rcu_read_lock_sched_held+0x110/0x130 [ 121.953850][T11051] ? kmem_cache_alloc+0x364/0x710 [ 121.958889][T11051] security_file_alloc+0x39/0x170 [ 121.963932][T11051] __alloc_file+0xac/0x300 [ 121.968365][T11051] alloc_empty_file+0x72/0x170 [ 121.973144][T11051] path_openat+0xef/0x46d0 [ 121.977568][T11051] ? _raw_spin_unlock_irq+0x5e/0x90 [ 121.982778][T11051] ? finish_task_switch+0x147/0x720 [ 121.987977][T11051] ? finish_task_switch+0x119/0x720 [ 121.993183][T11051] ? __schedule+0x75d/0x1580 [ 121.997786][T11051] ? __kasan_check_read+0x11/0x20 [ 122.002814][T11051] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 122.008204][T11051] ? __alloc_fd+0x487/0x620 [ 122.012718][T11051] do_filp_open+0x1a1/0x280 [ 122.017229][T11051] ? may_open_dev+0x100/0x100 [ 122.021910][T11051] ? lock_downgrade+0x920/0x920 [ 122.026770][T11051] ? rwlock_bug.part.0+0x90/0x90 [ 122.031770][T11051] ? __kasan_check_read+0x11/0x20 [ 122.036797][T11051] ? do_raw_spin_unlock+0x57/0x270 [ 122.041922][T11051] ? _raw_spin_unlock+0x2d/0x50 [ 122.046783][T11051] ? __alloc_fd+0x487/0x620 [ 122.051309][T11051] do_sys_open+0x3fe/0x5d0 [ 122.055741][T11051] ? filp_open+0x80/0x80 [ 122.060000][T11051] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 122.065469][T11051] ? do_syscall_64+0x26/0x6a0 [ 122.070504][T11051] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 122.076583][T11051] ? do_syscall_64+0x26/0x6a0 [ 122.081366][T11051] __x64_sys_open+0x7e/0xc0 [ 122.085885][T11051] do_syscall_64+0xfd/0x6a0 [ 122.090401][T11051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 122.096419][T11051] RIP: 0033:0x413701 [ 122.100322][T11051] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 122.119938][T11051] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 122.128367][T11051] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 122.136353][T11051] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce 23:27:30 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 122.144336][T11051] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 122.152317][T11051] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 122.160298][T11051] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:31 executing program 2 (fault-call:0 fault-nth:3): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:31 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 122.445960][T11068] FAULT_INJECTION: forcing a failure. [ 122.445960][T11068] name failslab, interval 1, probability 0, space 0, times 0 [ 122.462800][T11068] CPU: 0 PID: 11068 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 122.470476][T11068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.480943][T11068] Call Trace: [ 122.484357][T11068] dump_stack+0x172/0x1f0 [ 122.488724][T11068] should_fail.cold+0xa/0x15 [ 122.493340][T11068] ? fault_create_debugfs_attr+0x180/0x180 [ 122.499167][T11068] ? ___might_sleep+0x163/0x280 [ 122.504043][T11068] __should_failslab+0x121/0x190 [ 122.508986][T11068] should_failslab+0x9/0x14 [ 122.513506][T11068] kmem_cache_alloc+0x2aa/0x710 [ 122.518344][T11068] ? rcu_read_lock_sched_held+0x110/0x130 [ 122.524049][T11068] ? kmem_cache_alloc+0x364/0x710 [ 122.529064][T11068] security_file_alloc+0x39/0x170 [ 122.534078][T11068] __alloc_file+0xac/0x300 [ 122.538480][T11068] alloc_empty_file+0x72/0x170 [ 122.543233][T11068] path_openat+0xef/0x46d0 [ 122.547633][T11068] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 122.553445][T11068] ? kasan_slab_alloc+0xf/0x20 [ 122.558192][T11068] ? kmem_cache_alloc+0x121/0x710 [ 122.563207][T11068] ? getname_flags+0xd6/0x5b0 [ 122.567888][T11068] ? getname+0x1a/0x20 [ 122.571969][T11068] ? do_sys_open+0x2c9/0x5d0 [ 122.576551][T11068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 122.582801][T11068] ? __kasan_check_read+0x11/0x20 [ 122.587831][T11068] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 122.593207][T11068] ? __alloc_fd+0x487/0x620 [ 122.597720][T11068] do_filp_open+0x1a1/0x280 [ 122.602222][T11068] ? may_open_dev+0x100/0x100 [ 122.606892][T11068] ? lock_downgrade+0x920/0x920 [ 122.611735][T11068] ? rwlock_bug.part.0+0x90/0x90 [ 122.616668][T11068] ? __kasan_check_read+0x11/0x20 [ 122.621725][T11068] ? do_raw_spin_unlock+0x57/0x270 [ 122.626839][T11068] ? _raw_spin_unlock+0x2d/0x50 [ 122.631727][T11068] ? __alloc_fd+0x487/0x620 [ 122.637314][T11068] do_sys_open+0x3fe/0x5d0 [ 122.641747][T11068] ? filp_open+0x80/0x80 [ 122.645996][T11068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 122.651436][T11068] ? do_syscall_64+0x26/0x6a0 [ 122.656096][T11068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 122.662165][T11068] ? do_syscall_64+0x26/0x6a0 [ 122.666848][T11068] __x64_sys_open+0x7e/0xc0 [ 122.671353][T11068] do_syscall_64+0xfd/0x6a0 [ 122.675852][T11068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 122.681740][T11068] RIP: 0033:0x413701 [ 122.685660][T11068] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 122.705248][T11068] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 122.713654][T11068] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 122.721619][T11068] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 122.729600][T11068] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 122.737581][T11068] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 122.745571][T11068] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:31 executing program 2 (fault-call:0 fault-nth:4): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) 23:27:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:31 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 122.926981][T11063] XFS (loop3): Mounting V4 Filesystem [ 122.992587][T11063] XFS (loop3): empty log check failed [ 123.012647][T11063] XFS (loop3): log mount/recovery failed: error -5 [ 123.132564][T11063] XFS (loop3): log mount failed [ 123.229385][T11093] XFS (loop0): Invalid superblock magic number [ 123.248442][T11092] XFS (loop1): Invalid superblock magic number 23:27:31 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 123.299436][T11096] XFS (loop5): Mounting V4 Filesystem [ 123.348370][T11121] FAULT_INJECTION: forcing a failure. [ 123.348370][T11121] name failslab, interval 1, probability 0, space 0, times 0 [ 123.394403][T11096] XFS (loop5): empty log check failed [ 123.400097][T11096] XFS (loop5): log mount/recovery failed: error -5 [ 123.447782][T11121] CPU: 1 PID: 11121 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 123.455472][T11121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.465633][T11121] Call Trace: [ 123.468946][T11121] dump_stack+0x172/0x1f0 [ 123.473334][T11121] should_fail.cold+0xa/0x15 [ 123.477947][T11121] ? fault_create_debugfs_attr+0x180/0x180 [ 123.483771][T11121] ? __task_pid_nr_ns+0x1b1/0x540 [ 123.488829][T11121] __should_failslab+0x121/0x190 [ 123.493798][T11121] should_failslab+0x9/0x14 23:27:32 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 123.498325][T11121] kmem_cache_alloc_trace+0x4b/0x790 [ 123.503630][T11121] ? __kasan_check_read+0x11/0x20 [ 123.508678][T11121] proc_self_get_link+0x16f/0x1d0 [ 123.513722][T11121] ? proc_ns_dir_readdir+0x560/0x560 [ 123.519021][T11121] link_path_walk.part.0+0xed9/0x1340 [ 123.524425][T11121] ? walk_component+0x2000/0x2000 [ 123.529505][T11121] path_openat+0x202/0x46d0 [ 123.534024][T11121] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 123.539840][T11121] ? kasan_slab_alloc+0xf/0x20 [ 123.544875][T11121] ? kmem_cache_alloc+0x121/0x710 [ 123.544897][T11121] ? getname_flags+0xd6/0x5b0 [ 123.544908][T11121] ? getname+0x1a/0x20 [ 123.544922][T11121] ? do_sys_open+0x2c9/0x5d0 [ 123.544946][T11121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 123.544963][T11121] ? __kasan_check_read+0x11/0x20 [ 123.544978][T11121] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 123.545002][T11121] ? __alloc_fd+0x487/0x620 [ 123.545023][T11121] do_filp_open+0x1a1/0x280 [ 123.545041][T11121] ? may_open_dev+0x100/0x100 [ 123.545063][T11121] ? __kasan_check_read+0x11/0x20 [ 123.545087][T11121] ? do_raw_spin_unlock+0x57/0x270 [ 123.545105][T11121] ? _raw_spin_unlock+0x2d/0x50 [ 123.608888][T11121] do_sys_open+0x3fe/0x5d0 [ 123.613332][T11121] ? filp_open+0x80/0x80 [ 123.617610][T11121] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 123.623087][T11121] ? do_syscall_64+0x26/0x6a0 [ 123.627794][T11121] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 123.634058][T11121] ? do_syscall_64+0x26/0x6a0 [ 123.638788][T11121] __x64_sys_open+0x7e/0xc0 [ 123.643313][T11121] do_syscall_64+0xfd/0x6a0 23:27:32 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 123.647841][T11121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 123.653754][T11121] RIP: 0033:0x413701 [ 123.657661][T11121] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 123.677285][T11121] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 123.685721][T11121] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 123.693712][T11121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 123.701700][T11121] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 123.709716][T11121] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 123.717698][T11121] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 123.814064][T11096] XFS (loop5): log mount failed 23:27:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:32 executing program 2 (fault-call:0 fault-nth:5): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:32 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:32 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 124.025943][T11144] FAULT_INJECTION: forcing a failure. [ 124.025943][T11144] name failslab, interval 1, probability 0, space 0, times 0 [ 124.039111][T11144] CPU: 0 PID: 11144 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 124.046771][T11144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.056841][T11144] Call Trace: [ 124.060167][T11144] dump_stack+0x172/0x1f0 [ 124.065220][T11144] should_fail.cold+0xa/0x15 [ 124.070157][T11144] ? fault_create_debugfs_attr+0x180/0x180 [ 124.075969][T11144] ? ___might_sleep+0x163/0x280 [ 124.080831][T11144] __should_failslab+0x121/0x190 [ 124.085777][T11144] ? proc_free_inode+0x20/0x20 [ 124.090555][T11144] should_failslab+0x9/0x14 [ 124.095051][T11144] kmem_cache_alloc+0x2aa/0x710 [ 124.099905][T11144] ? find_held_lock+0x35/0x130 [ 124.104666][T11144] ? get_pid_task+0xc9/0x190 [ 124.109286][T11144] ? proc_free_inode+0x20/0x20 [ 124.114034][T11144] proc_alloc_inode+0x1c/0x1a0 [ 124.118805][T11144] alloc_inode+0x68/0x1e0 [ 124.123158][T11144] new_inode_pseudo+0x19/0xf0 [ 124.127837][T11144] new_inode+0x1f/0x40 [ 124.131902][T11144] proc_pid_make_inode+0x22/0x230 [ 124.137053][T11144] proc_pident_instantiate+0x82/0x2a0 [ 124.142422][T11144] proc_pident_lookup+0x1ad/0x210 [ 124.147451][T11144] proc_tgid_base_lookup+0x2c/0x40 [ 124.152555][T11144] __lookup_slow+0x279/0x500 [ 124.157159][T11144] ? vfs_unlink+0x620/0x620 [ 124.161697][T11144] ? trailing_symlink+0x990/0x990 [ 124.166761][T11144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 124.173001][T11144] lookup_slow+0x58/0x80 [ 124.177247][T11144] walk_component+0x747/0x2000 [ 124.182007][T11144] ? selinux_capable+0x40/0x40 [ 124.186774][T11144] ? path_init+0x18f0/0x18f0 [ 124.191350][T11144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 124.197573][T11144] ? security_inode_permission+0xcb/0x100 [ 124.203279][T11144] ? inode_permission+0xb4/0x560 [ 124.208231][T11144] link_path_walk.part.0+0x9a4/0x1340 [ 124.213596][T11144] ? walk_component+0x2000/0x2000 [ 124.218618][T11144] path_openat+0x202/0x46d0 [ 124.223108][T11144] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 124.228899][T11144] ? kasan_slab_alloc+0xf/0x20 [ 124.233684][T11144] ? kmem_cache_alloc+0x121/0x710 [ 124.238726][T11144] ? getname_flags+0xd6/0x5b0 [ 124.243400][T11144] ? getname+0x1a/0x20 [ 124.247476][T11144] ? do_sys_open+0x2c9/0x5d0 [ 124.252053][T11144] ? __kasan_check_read+0x11/0x20 [ 124.257063][T11144] ? __kasan_check_read+0x11/0x20 [ 124.262069][T11144] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 124.267522][T11144] ? __alloc_fd+0x487/0x620 [ 124.272014][T11144] do_filp_open+0x1a1/0x280 [ 124.276754][T11144] ? may_open_dev+0x100/0x100 [ 124.281460][T11144] ? simple_attr_release+0x50/0x50 [ 124.286558][T11144] ? do_raw_spin_unlock+0x57/0x270 [ 124.291655][T11144] ? _raw_spin_unlock+0x2d/0x50 [ 124.296536][T11144] do_sys_open+0x3fe/0x5d0 [ 124.300966][T11144] ? filp_open+0x80/0x80 [ 124.305216][T11144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 124.310659][T11144] ? do_syscall_64+0x26/0x6a0 [ 124.315319][T11144] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 124.321368][T11144] ? do_syscall_64+0x26/0x6a0 [ 124.326049][T11144] __x64_sys_open+0x7e/0xc0 [ 124.330561][T11144] do_syscall_64+0xfd/0x6a0 [ 124.335083][T11144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 124.340975][T11144] RIP: 0033:0x413701 [ 124.344869][T11144] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 124.364472][T11144] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 124.372890][T11144] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 124.380868][T11144] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 124.388858][T11144] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 124.396824][T11144] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 124.404788][T11144] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) 23:27:33 executing program 2 (fault-call:0 fault-nth:6): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:33 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 124.772241][T11168] FAULT_INJECTION: forcing a failure. [ 124.772241][T11168] name failslab, interval 1, probability 0, space 0, times 0 [ 124.798724][T11168] CPU: 0 PID: 11168 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 124.806495][T11168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.816587][T11168] Call Trace: 23:27:33 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 124.819896][T11168] dump_stack+0x172/0x1f0 [ 124.824251][T11168] should_fail.cold+0xa/0x15 [ 124.828866][T11168] ? fault_create_debugfs_attr+0x180/0x180 [ 124.834700][T11168] ? ___might_sleep+0x163/0x280 [ 124.839578][T11168] __should_failslab+0x121/0x190 [ 124.844539][T11168] ? proc_free_inode+0x20/0x20 [ 124.849326][T11168] should_failslab+0x9/0x14 [ 124.853850][T11168] kmem_cache_alloc+0x2aa/0x710 [ 124.857153][T11154] XFS (loop0): Invalid superblock magic number [ 124.858726][T11168] ? find_held_lock+0x35/0x130 [ 124.858761][T11168] ? get_pid_task+0xc9/0x190 [ 124.858779][T11168] ? proc_free_inode+0x20/0x20 [ 124.858797][T11168] proc_alloc_inode+0x1c/0x1a0 [ 124.858814][T11168] alloc_inode+0x68/0x1e0 [ 124.858831][T11168] new_inode_pseudo+0x19/0xf0 [ 124.858853][T11168] new_inode+0x1f/0x40 [ 124.868345][T11153] XFS (loop1): Invalid superblock magic number [ 124.869781][T11168] proc_pid_make_inode+0x22/0x230 [ 124.869801][T11168] proc_pident_instantiate+0x82/0x2a0 [ 124.869821][T11168] proc_pident_lookup+0x1ad/0x210 [ 124.869845][T11168] proc_tgid_base_lookup+0x2c/0x40 [ 124.869868][T11168] __lookup_slow+0x279/0x500 [ 124.928077][T11168] ? vfs_unlink+0x620/0x620 [ 124.932608][T11168] ? trailing_symlink+0x990/0x990 [ 124.937633][T11168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 124.943972][T11168] lookup_slow+0x58/0x80 [ 124.948253][T11168] walk_component+0x747/0x2000 [ 124.953029][T11168] ? selinux_capable+0x40/0x40 [ 124.957803][T11168] ? path_init+0x18f0/0x18f0 [ 124.962389][T11168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 124.968665][T11168] ? security_inode_permission+0xcb/0x100 [ 124.974380][T11168] ? inode_permission+0xb4/0x560 [ 124.979320][T11168] link_path_walk.part.0+0x9a4/0x1340 [ 124.984695][T11168] ? walk_component+0x2000/0x2000 [ 124.989741][T11168] path_openat+0x202/0x46d0 [ 124.994257][T11168] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 125.000067][T11168] ? kasan_slab_alloc+0xf/0x20 [ 125.004819][T11168] ? kmem_cache_alloc+0x121/0x710 [ 125.009832][T11168] ? getname_flags+0xd6/0x5b0 [ 125.014490][T11168] ? getname+0x1a/0x20 [ 125.018541][T11168] ? do_sys_open+0x2c9/0x5d0 [ 125.023117][T11168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 125.029341][T11168] ? __kasan_check_read+0x11/0x20 [ 125.034348][T11168] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 125.039715][T11168] ? __alloc_fd+0x487/0x620 [ 125.044238][T11168] do_filp_open+0x1a1/0x280 [ 125.048737][T11168] ? may_open_dev+0x100/0x100 [ 125.053419][T11168] ? simple_attr_release+0x50/0x50 [ 125.058527][T11168] ? do_raw_spin_unlock+0x57/0x270 [ 125.063646][T11168] ? _raw_spin_unlock+0x2d/0x50 [ 125.068514][T11168] do_sys_open+0x3fe/0x5d0 [ 125.072944][T11168] ? filp_open+0x80/0x80 [ 125.077217][T11168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 125.082685][T11168] ? do_syscall_64+0x26/0x6a0 [ 125.087447][T11168] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.093524][T11168] ? do_syscall_64+0x26/0x6a0 [ 125.098222][T11168] __x64_sys_open+0x7e/0xc0 [ 125.102748][T11168] do_syscall_64+0xfd/0x6a0 [ 125.107268][T11168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.116824][T11168] RIP: 0033:0x413701 [ 125.120731][T11168] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 125.140330][T11168] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 125.148753][T11168] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 125.156738][T11168] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 125.164719][T11168] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 125.172683][T11168] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 125.181294][T11168] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 125.194899][T11157] XFS (loop3): Mounting V4 Filesystem [ 125.208104][T11157] XFS (loop3): empty log check failed 23:27:33 executing program 2 (fault-call:0 fault-nth:7): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 125.220235][T11157] XFS (loop3): log mount/recovery failed: error -5 [ 125.272795][T11157] XFS (loop3): log mount failed [ 125.407282][T11195] FAULT_INJECTION: forcing a failure. [ 125.407282][T11195] name failslab, interval 1, probability 0, space 0, times 0 [ 125.431621][T11195] CPU: 0 PID: 11195 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 125.439308][T11195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.449375][T11195] Call Trace: [ 125.452689][T11195] dump_stack+0x172/0x1f0 23:27:34 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 125.457075][T11195] should_fail.cold+0xa/0x15 [ 125.461709][T11195] ? fault_create_debugfs_attr+0x180/0x180 [ 125.467538][T11195] ? ___might_sleep+0x163/0x280 [ 125.472411][T11195] __should_failslab+0x121/0x190 [ 125.477550][T11195] should_failslab+0x9/0x14 [ 125.482075][T11195] kmem_cache_alloc+0x2aa/0x710 [ 125.487063][T11195] ? __put_user_ns+0x70/0x70 [ 125.491686][T11195] ? rcu_read_lock_sched_held+0x110/0x130 [ 125.497432][T11195] security_inode_alloc+0x39/0x160 [ 125.502555][T11195] inode_init_always+0x56e/0xb50 [ 125.507504][T11195] alloc_inode+0x89/0x1e0 [ 125.511890][T11195] new_inode_pseudo+0x19/0xf0 [ 125.516585][T11195] new_inode+0x1f/0x40 [ 125.520666][T11195] proc_pid_make_inode+0x22/0x230 [ 125.525728][T11195] proc_pident_instantiate+0x82/0x2a0 [ 125.531129][T11195] proc_pident_lookup+0x1ad/0x210 [ 125.536168][T11195] proc_tgid_base_lookup+0x2c/0x40 [ 125.536184][T11195] __lookup_slow+0x279/0x500 [ 125.536198][T11195] ? vfs_unlink+0x620/0x620 [ 125.536231][T11195] ? trailing_symlink+0x990/0x990 [ 125.536247][T11195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 125.536265][T11195] lookup_slow+0x58/0x80 [ 125.536284][T11195] walk_component+0x747/0x2000 [ 125.555507][T11195] ? selinux_capable+0x40/0x40 [ 125.555532][T11195] ? path_init+0x18f0/0x18f0 [ 125.555555][T11195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 125.555569][T11195] ? security_inode_permission+0xcb/0x100 [ 125.555587][T11195] ? inode_permission+0xb4/0x560 [ 125.555609][T11195] link_path_walk.part.0+0x9a4/0x1340 [ 125.566096][T11195] ? walk_component+0x2000/0x2000 [ 125.566125][T11195] path_openat+0x202/0x46d0 [ 125.566139][T11195] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 125.566159][T11195] ? kasan_slab_alloc+0xf/0x20 [ 125.622516][T11195] ? kmem_cache_alloc+0x121/0x710 [ 125.627615][T11195] ? getname_flags+0xd6/0x5b0 [ 125.632284][T11195] ? getname+0x1a/0x20 [ 125.636343][T11195] ? do_sys_open+0x2c9/0x5d0 [ 125.640925][T11195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 125.647174][T11195] ? __kasan_check_read+0x11/0x20 [ 125.652193][T11195] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 125.657566][T11195] ? __alloc_fd+0x487/0x620 [ 125.662064][T11195] do_filp_open+0x1a1/0x280 [ 125.666554][T11195] ? may_open_dev+0x100/0x100 [ 125.671256][T11195] ? simple_attr_release+0x50/0x50 [ 125.676364][T11195] ? do_raw_spin_unlock+0x57/0x270 [ 125.681463][T11195] ? _raw_spin_unlock+0x2d/0x50 [ 125.686331][T11195] do_sys_open+0x3fe/0x5d0 [ 125.690783][T11195] ? filp_open+0x80/0x80 [ 125.695018][T11195] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 125.700467][T11195] ? do_syscall_64+0x26/0x6a0 [ 125.705130][T11195] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.711185][T11195] ? do_syscall_64+0x26/0x6a0 [ 125.715877][T11195] __x64_sys_open+0x7e/0xc0 [ 125.720384][T11195] do_syscall_64+0xfd/0x6a0 [ 125.724877][T11195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 125.730838][T11195] RIP: 0033:0x413701 [ 125.734721][T11195] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 125.754310][T11195] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 125.762721][T11195] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 125.770674][T11195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 125.778631][T11195] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 125.786584][T11195] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 125.794541][T11195] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 125.891882][T11188] XFS (loop5): Mounting V4 Filesystem [ 125.920347][T11188] XFS (loop5): empty log check failed [ 125.927964][T11188] XFS (loop5): log mount/recovery failed: error -5 [ 125.992604][T11188] XFS (loop5): log mount failed 23:27:34 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:34 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:34 executing program 2 (fault-call:0 fault-nth:8): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 126.117232][T11219] FAULT_INJECTION: forcing a failure. [ 126.117232][T11219] name failslab, interval 1, probability 0, space 0, times 0 [ 126.162579][T11219] CPU: 1 PID: 11219 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 126.170266][T11219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.180930][T11219] Call Trace: [ 126.184253][T11219] dump_stack+0x172/0x1f0 [ 126.188613][T11219] should_fail.cold+0xa/0x15 [ 126.193315][T11219] ? fault_create_debugfs_attr+0x180/0x180 [ 126.199148][T11219] ? ___might_sleep+0x163/0x280 [ 126.204026][T11219] __should_failslab+0x121/0x190 23:27:34 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 126.208980][T11219] should_failslab+0x9/0x14 [ 126.213591][T11219] kmem_cache_alloc+0x2aa/0x710 [ 126.218454][T11219] ? __kasan_check_read+0x11/0x20 [ 126.224024][T11219] ? __lock_acquire+0x8a0/0x4690 [ 126.224040][T11219] ? __kasan_check_read+0x11/0x20 [ 126.224057][T11219] __d_alloc+0x2e/0x8c0 [ 126.224075][T11219] d_alloc+0x4d/0x280 [ 126.224094][T11219] d_alloc_parallel+0xf4/0x1c30 [ 126.224113][T11219] ? lock_downgrade+0x920/0x920 [ 126.224133][T11219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.224154][T11219] ? __kasan_check_read+0x11/0x20 [ 126.234115][T11219] ? __d_lookup_rcu+0x6c0/0x6c0 [ 126.234129][T11219] ? __d_lookup+0x42f/0x760 [ 126.234143][T11219] ? lookup_open+0x2c2/0x1a90 [ 126.234157][T11219] ? d_lookup+0xf9/0x260 [ 126.234175][T11219] ? lockdep_hardirqs_on+0x418/0x5d0 [ 126.234197][T11219] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 126.234218][T11219] ? d_lookup+0x19e/0x260 [ 126.234237][T11219] lookup_open+0x525/0x1a90 [ 126.234262][T11219] ? vfs_link+0xb90/0xb90 [ 126.234309][T11219] path_openat+0x1eb2/0x46d0 [ 126.234323][T11219] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 126.234336][T11219] ? kasan_slab_alloc+0xf/0x20 [ 126.234358][T11219] ? kmem_cache_alloc+0x121/0x710 [ 126.325938][T11219] ? getname_flags+0xd6/0x5b0 [ 126.330630][T11219] ? getname+0x1a/0x20 [ 126.334719][T11219] ? do_sys_open+0x2c9/0x5d0 [ 126.339337][T11219] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 126.344731][T11219] ? crypto_nhpoly1305_update_helper+0x1d0/0x220 [ 126.351161][T11219] ? __alloc_fd+0x487/0x620 [ 126.355694][T11219] do_filp_open+0x1a1/0x280 [ 126.360216][T11219] ? may_open_dev+0x100/0x100 [ 126.364917][T11219] ? simple_attr_release+0x50/0x50 [ 126.370041][T11219] ? do_raw_spin_unlock+0x57/0x270 [ 126.375165][T11219] ? _raw_spin_unlock+0x2d/0x50 [ 126.375198][T11219] do_sys_open+0x3fe/0x5d0 [ 126.375224][T11219] ? filp_open+0x80/0x80 [ 126.375243][T11219] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 126.375258][T11219] ? do_syscall_64+0x26/0x6a0 [ 126.375271][T11219] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.375286][T11219] ? do_syscall_64+0x26/0x6a0 [ 126.375308][T11219] __x64_sys_open+0x7e/0xc0 [ 126.375329][T11219] do_syscall_64+0xfd/0x6a0 [ 126.418642][T11219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.424540][T11219] RIP: 0033:0x413701 [ 126.428440][T11219] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 126.448052][T11219] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 126.456619][T11219] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 126.464596][T11219] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 126.472573][T11219] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 126.480555][T11219] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 126.488531][T11219] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 126.537701][T11215] XFS (loop0): Invalid superblock magic number 23:27:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:35 executing program 2 (fault-call:0 fault-nth:9): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:35 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 126.675290][T11218] XFS (loop1): Invalid superblock magic number 23:27:35 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 126.760147][T11246] FAULT_INJECTION: forcing a failure. [ 126.760147][T11246] name failslab, interval 1, probability 0, space 0, times 0 [ 126.774411][T11246] CPU: 1 PID: 11246 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 126.782080][T11246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.792155][T11246] Call Trace: [ 126.795480][T11246] dump_stack+0x172/0x1f0 [ 126.799835][T11246] should_fail.cold+0xa/0x15 [ 126.804438][T11246] ? fault_create_debugfs_attr+0x180/0x180 [ 126.810276][T11246] ? ___might_sleep+0x163/0x280 [ 126.815131][T11246] __should_failslab+0x121/0x190 [ 126.820069][T11246] ? proc_free_inode+0x20/0x20 [ 126.824825][T11246] should_failslab+0x9/0x14 [ 126.829321][T11246] kmem_cache_alloc+0x2aa/0x710 [ 126.834177][T11246] ? find_held_lock+0x35/0x130 [ 126.838961][T11246] ? get_pid_task+0xc9/0x190 [ 126.843564][T11246] ? proc_free_inode+0x20/0x20 [ 126.848323][T11246] proc_alloc_inode+0x1c/0x1a0 [ 126.853091][T11246] alloc_inode+0x68/0x1e0 [ 126.857441][T11246] new_inode_pseudo+0x19/0xf0 [ 126.862121][T11246] new_inode+0x1f/0x40 [ 126.866175][T11246] proc_pid_make_inode+0x22/0x230 [ 126.871187][T11246] proc_ns_instantiate+0x58/0x100 [ 126.876221][T11246] proc_ns_dir_lookup+0x1ac/0x210 [ 126.881278][T11246] ? proc_ns_instantiate+0x100/0x100 [ 126.886667][T11246] lookup_open+0x6cd/0x1a90 [ 126.891199][T11246] ? vfs_link+0xb90/0xb90 [ 126.895597][T11246] path_openat+0x1eb2/0x46d0 [ 126.900193][T11246] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 126.906012][T11246] ? kasan_slab_alloc+0xf/0x20 [ 126.910761][T11246] ? kmem_cache_alloc+0x121/0x710 [ 126.915784][T11246] ? getname_flags+0xd6/0x5b0 [ 126.920484][T11246] ? getname+0x1a/0x20 [ 126.924560][T11246] ? do_sys_open+0x2c9/0x5d0 [ 126.929469][T11246] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 126.934853][T11246] ? __alloc_fd+0x487/0x620 [ 126.939356][T11246] do_filp_open+0x1a1/0x280 [ 126.943847][T11246] ? may_open_dev+0x100/0x100 [ 126.948518][T11246] ? simple_attr_release+0x50/0x50 [ 126.953631][T11246] ? do_raw_spin_unlock+0x57/0x270 [ 126.958757][T11246] ? _raw_spin_unlock+0x2d/0x50 [ 126.963604][T11246] do_sys_open+0x3fe/0x5d0 [ 126.968013][T11246] ? filp_open+0x80/0x80 [ 126.972274][T11246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 126.977747][T11246] ? do_syscall_64+0x26/0x6a0 [ 126.982431][T11246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.988527][T11246] ? do_syscall_64+0x26/0x6a0 [ 126.993214][T11246] __x64_sys_open+0x7e/0xc0 [ 126.997728][T11246] do_syscall_64+0xfd/0x6a0 [ 127.002243][T11246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.008182][T11246] RIP: 0033:0x413701 [ 127.012095][T11246] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 127.031687][T11246] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 127.044944][T11246] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 127.052911][T11246] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 127.060880][T11246] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 127.068841][T11246] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 127.077436][T11246] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:35 executing program 2 (fault-call:0 fault-nth:10): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:35 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 127.291727][T11256] XFS (loop5): Mounting V4 Filesystem [ 127.307196][T11256] XFS (loop5): empty log check failed [ 127.312943][T11256] XFS (loop5): log mount/recovery failed: error -5 23:27:36 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 127.364631][T11256] XFS (loop5): log mount failed [ 127.384556][T11273] FAULT_INJECTION: forcing a failure. [ 127.384556][T11273] name failslab, interval 1, probability 0, space 0, times 0 [ 127.480251][T11273] CPU: 0 PID: 11273 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 127.488010][T11273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.498067][T11273] Call Trace: [ 127.498093][T11273] dump_stack+0x172/0x1f0 [ 127.498118][T11273] should_fail.cold+0xa/0x15 [ 127.498141][T11273] ? fault_create_debugfs_attr+0x180/0x180 [ 127.498167][T11273] ? ___might_sleep+0x163/0x280 [ 127.498190][T11273] __should_failslab+0x121/0x190 [ 127.498209][T11273] should_failslab+0x9/0x14 [ 127.498229][T11273] kmem_cache_alloc+0x2aa/0x710 [ 127.498244][T11273] ? __put_user_ns+0x70/0x70 [ 127.498264][T11273] ? rcu_read_lock_sched_held+0x110/0x130 [ 127.498283][T11273] security_inode_alloc+0x39/0x160 [ 127.498307][T11273] inode_init_always+0x56e/0xb50 [ 127.555758][T11273] alloc_inode+0x89/0x1e0 [ 127.560101][T11273] new_inode_pseudo+0x19/0xf0 [ 127.564792][T11273] new_inode+0x1f/0x40 [ 127.568871][T11273] proc_pid_make_inode+0x22/0x230 [ 127.573914][T11273] proc_ns_instantiate+0x58/0x100 [ 127.578952][T11273] proc_ns_dir_lookup+0x1ac/0x210 [ 127.583991][T11273] ? proc_ns_instantiate+0x100/0x100 [ 127.589287][T11273] lookup_open+0x6cd/0x1a90 [ 127.593897][T11273] ? vfs_link+0xb90/0xb90 [ 127.598268][T11273] path_openat+0x1eb2/0x46d0 [ 127.598285][T11273] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 127.598298][T11273] ? kasan_slab_alloc+0xf/0x20 [ 127.598314][T11273] ? kmem_cache_alloc+0x121/0x710 [ 127.598336][T11273] ? getname_flags+0xd6/0x5b0 [ 127.608723][T11273] ? getname+0x1a/0x20 [ 127.608740][T11273] ? do_sys_open+0x2c9/0x5d0 [ 127.608772][T11273] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 127.608794][T11273] ? create_new_namespaces+0x4a0/0x7b0 [ 127.608815][T11273] ? __alloc_fd+0x487/0x620 [ 127.647303][T11273] do_filp_open+0x1a1/0x280 [ 127.651822][T11273] ? may_open_dev+0x100/0x100 [ 127.656533][T11273] ? simple_attr_release+0x50/0x50 [ 127.661659][T11273] ? do_raw_spin_unlock+0x57/0x270 [ 127.666791][T11273] ? _raw_spin_unlock+0x2d/0x50 [ 127.671675][T11273] do_sys_open+0x3fe/0x5d0 [ 127.676112][T11273] ? filp_open+0x80/0x80 [ 127.680375][T11273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 127.685846][T11273] ? do_syscall_64+0x26/0x6a0 [ 127.690534][T11273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.696615][T11273] ? do_syscall_64+0x26/0x6a0 [ 127.701312][T11273] __x64_sys_open+0x7e/0xc0 [ 127.705832][T11273] do_syscall_64+0xfd/0x6a0 [ 127.710350][T11273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.716246][T11273] RIP: 0033:0x413701 [ 127.720150][T11273] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 127.720160][T11273] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 127.720176][T11273] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 127.720185][T11273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 127.720195][T11273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 127.720204][T11273] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 23:27:36 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:36 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 127.720213][T11273] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 127.879869][T11280] XFS (loop0): Invalid superblock magic number 23:27:36 executing program 2 (fault-call:0 fault-nth:11): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 127.931319][T11285] XFS (loop1): Invalid superblock magic number 23:27:36 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:36 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 128.137603][T11312] FAULT_INJECTION: forcing a failure. [ 128.137603][T11312] name failslab, interval 1, probability 0, space 0, times 0 [ 128.150558][T11312] CPU: 0 PID: 11312 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 128.158202][T11312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.158210][T11312] Call Trace: [ 128.158238][T11312] dump_stack+0x172/0x1f0 [ 128.158266][T11312] should_fail.cold+0xa/0x15 [ 128.158290][T11312] ? fault_create_debugfs_attr+0x180/0x180 [ 128.158313][T11312] ? ___might_sleep+0x163/0x280 [ 128.158336][T11312] __should_failslab+0x121/0x190 [ 128.158357][T11312] should_failslab+0x9/0x14 [ 128.158375][T11312] kmem_cache_alloc+0x2aa/0x710 [ 128.158394][T11312] ? lock_downgrade+0x920/0x920 [ 128.158415][T11312] ? group_pin_kill+0x1c0/0x1c0 [ 128.158432][T11312] alloc_inode+0x16f/0x1e0 [ 128.219843][T11312] new_inode_pseudo+0x19/0xf0 [ 128.224553][T11312] __ns_get_path.isra.0+0x13c/0x770 [ 128.229773][T11312] ? group_pin_kill+0x1c0/0x1c0 [ 128.234636][T11312] ns_get_path_cb+0x33/0x70 [ 128.239152][T11312] ns_get_path+0x81/0xb0 [ 128.243404][T11312] ? ns_get_path_cb+0x70/0x70 [ 128.248091][T11312] ? do_raw_spin_unlock+0x57/0x270 [ 128.253215][T11312] ? _raw_spin_unlock+0x2d/0x50 [ 128.258080][T11312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 128.264328][T11312] proc_ns_get_link+0x170/0x1b0 [ 128.269555][T11312] ? proc_ns_readlink+0x240/0x240 [ 128.274590][T11312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 128.280831][T11312] ? security_inode_follow_link+0xe4/0x120 [ 128.286644][T11312] trailing_symlink+0x785/0x990 [ 128.291492][T11312] ? proc_ns_readlink+0x240/0x240 [ 128.296513][T11312] path_openat+0xa95/0x46d0 [ 128.301004][T11312] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 128.306817][T11312] ? kasan_slab_alloc+0xf/0x20 [ 128.311584][T11312] ? kmem_cache_alloc+0x121/0x710 [ 128.316598][T11312] ? getname_flags+0xd6/0x5b0 [ 128.321274][T11312] ? getname+0x1a/0x20 [ 128.325370][T11312] ? do_sys_open+0x2c9/0x5d0 [ 128.329979][T11312] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 128.335342][T11312] ? __alloc_fd+0x487/0x620 [ 128.339835][T11312] do_filp_open+0x1a1/0x280 [ 128.344321][T11312] ? may_open_dev+0x100/0x100 [ 128.348990][T11312] ? do_raw_spin_unlock+0x57/0x270 [ 128.354088][T11312] ? _raw_spin_unlock+0x2d/0x50 [ 128.358937][T11312] do_sys_open+0x3fe/0x5d0 [ 128.363450][T11312] ? filp_open+0x80/0x80 [ 128.367680][T11312] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 128.373133][T11312] ? do_syscall_64+0x26/0x6a0 [ 128.377816][T11312] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.383879][T11312] ? do_syscall_64+0x26/0x6a0 23:27:37 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:37 executing program 2 (fault-call:0 fault-nth:12): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 128.388581][T11312] __x64_sys_open+0x7e/0xc0 [ 128.393104][T11312] do_syscall_64+0xfd/0x6a0 [ 128.397613][T11312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.403503][T11312] RIP: 0033:0x413701 [ 128.403520][T11312] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 128.403527][T11312] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 128.403545][T11312] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 128.403553][T11312] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 128.403561][T11312] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 128.403569][T11312] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 128.403578][T11312] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:37 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 128.685882][T11323] FAULT_INJECTION: forcing a failure. [ 128.685882][T11323] name failslab, interval 1, probability 0, space 0, times 0 23:27:37 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 128.727513][T11323] CPU: 0 PID: 11323 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 128.735189][T11323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.745286][T11323] Call Trace: [ 128.748600][T11323] dump_stack+0x172/0x1f0 [ 128.752944][T11323] should_fail.cold+0xa/0x15 [ 128.757540][T11323] ? fault_create_debugfs_attr+0x180/0x180 [ 128.763355][T11323] ? ___might_sleep+0x163/0x280 [ 128.768198][T11323] __should_failslab+0x121/0x190 [ 128.773158][T11323] should_failslab+0x9/0x14 [ 128.777645][T11323] kmem_cache_alloc+0x2aa/0x710 [ 128.782504][T11323] ? lock_downgrade+0x920/0x920 [ 128.787340][T11323] ? group_pin_kill+0x1c0/0x1c0 [ 128.792172][T11323] alloc_inode+0x16f/0x1e0 [ 128.796574][T11323] new_inode_pseudo+0x19/0xf0 [ 128.801239][T11323] __ns_get_path.isra.0+0x13c/0x770 [ 128.806433][T11323] ? group_pin_kill+0x1c0/0x1c0 [ 128.811266][T11323] ns_get_path_cb+0x33/0x70 [ 128.815784][T11323] ns_get_path+0x81/0xb0 [ 128.820045][T11323] ? ns_get_path_cb+0x70/0x70 [ 128.824714][T11323] ? do_raw_spin_unlock+0x57/0x270 [ 128.829835][T11323] ? _raw_spin_unlock+0x2d/0x50 [ 128.834674][T11323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 128.840914][T11323] proc_ns_get_link+0x170/0x1b0 [ 128.845753][T11323] ? proc_ns_readlink+0x240/0x240 [ 128.850765][T11323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 128.857063][T11323] ? security_inode_follow_link+0xe4/0x120 [ 128.862862][T11323] trailing_symlink+0x785/0x990 [ 128.867697][T11323] ? proc_ns_readlink+0x240/0x240 [ 128.872736][T11323] path_openat+0xa95/0x46d0 [ 128.877224][T11323] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 128.883011][T11323] ? kasan_slab_alloc+0xf/0x20 [ 128.887757][T11323] ? kmem_cache_alloc+0x121/0x710 [ 128.892761][T11323] ? getname_flags+0xd6/0x5b0 [ 128.897436][T11323] ? getname+0x1a/0x20 [ 128.901505][T11323] ? do_sys_open+0x2c9/0x5d0 [ 128.906099][T11323] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 128.911471][T11323] ? __alloc_fd+0x487/0x620 [ 128.915963][T11323] do_filp_open+0x1a1/0x280 [ 128.920460][T11323] ? may_open_dev+0x100/0x100 [ 128.925128][T11323] ? do_raw_spin_unlock+0x57/0x270 [ 128.930231][T11323] ? _raw_spin_unlock+0x2d/0x50 [ 128.935101][T11323] do_sys_open+0x3fe/0x5d0 [ 128.939511][T11323] ? filp_open+0x80/0x80 [ 128.943791][T11323] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 128.949241][T11323] ? do_syscall_64+0x26/0x6a0 [ 128.953902][T11323] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.959959][T11323] ? do_syscall_64+0x26/0x6a0 [ 128.964635][T11323] __x64_sys_open+0x7e/0xc0 [ 128.969131][T11323] do_syscall_64+0xfd/0x6a0 [ 128.973623][T11323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.979520][T11323] RIP: 0033:0x413701 [ 128.983401][T11323] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 129.006375][T11323] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 129.014887][T11323] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 23:27:37 executing program 2 (fault-call:0 fault-nth:13): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 129.022841][T11323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 129.030797][T11323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 129.038772][T11323] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 129.046742][T11323] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 129.236319][T11338] FAULT_INJECTION: forcing a failure. [ 129.236319][T11338] name failslab, interval 1, probability 0, space 0, times 0 23:27:37 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 129.307655][T11338] CPU: 0 PID: 11338 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 129.315339][T11338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.325407][T11338] Call Trace: [ 129.328728][T11338] dump_stack+0x172/0x1f0 [ 129.333119][T11338] should_fail.cold+0xa/0x15 [ 129.337756][T11338] ? fault_create_debugfs_attr+0x180/0x180 [ 129.343590][T11338] ? ___might_sleep+0x163/0x280 [ 129.348471][T11338] __should_failslab+0x121/0x190 [ 129.353440][T11338] should_failslab+0x9/0x14 [ 129.357935][T11338] kmem_cache_alloc+0x2aa/0x710 [ 129.362776][T11338] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 129.368655][T11338] ? rwlock_bug.part.0+0x90/0x90 [ 129.373600][T11338] __d_alloc+0x2e/0x8c0 [ 129.377755][T11338] d_alloc_anon+0x18/0x20 [ 129.382103][T11338] __ns_get_path.isra.0+0x308/0x770 [ 129.387288][T11338] ? group_pin_kill+0x1c0/0x1c0 [ 129.392136][T11338] ns_get_path_cb+0x33/0x70 [ 129.396627][T11338] ns_get_path+0x81/0xb0 [ 129.400858][T11338] ? ns_get_path_cb+0x70/0x70 [ 129.405518][T11338] ? do_raw_spin_unlock+0x57/0x270 [ 129.410627][T11338] ? _raw_spin_unlock+0x2d/0x50 [ 129.415476][T11338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.421715][T11338] proc_ns_get_link+0x170/0x1b0 [ 129.426557][T11338] ? proc_ns_readlink+0x240/0x240 [ 129.431572][T11338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.437810][T11338] ? security_inode_follow_link+0xe4/0x120 [ 129.443611][T11338] trailing_symlink+0x785/0x990 [ 129.448470][T11338] ? proc_ns_readlink+0x240/0x240 [ 129.453503][T11338] path_openat+0xa95/0x46d0 [ 129.457991][T11338] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 129.463778][T11338] ? kasan_slab_alloc+0xf/0x20 [ 129.468524][T11338] ? kmem_cache_alloc+0x121/0x710 [ 129.473528][T11338] ? getname_flags+0xd6/0x5b0 [ 129.478188][T11338] ? getname+0x1a/0x20 [ 129.482241][T11338] ? do_sys_open+0x2c9/0x5d0 [ 129.486844][T11338] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 129.492217][T11338] ? __alloc_fd+0x487/0x620 [ 129.496719][T11338] do_filp_open+0x1a1/0x280 [ 129.501209][T11338] ? may_open_dev+0x100/0x100 [ 129.505876][T11338] ? do_raw_spin_unlock+0x57/0x270 [ 129.510973][T11338] ? _raw_spin_unlock+0x2d/0x50 [ 129.515816][T11338] do_sys_open+0x3fe/0x5d0 [ 129.520220][T11338] ? filp_open+0x80/0x80 [ 129.524450][T11338] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 129.529912][T11338] ? do_syscall_64+0x26/0x6a0 [ 129.534580][T11338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 129.540634][T11338] ? do_syscall_64+0x26/0x6a0 [ 129.545328][T11338] __x64_sys_open+0x7e/0xc0 [ 129.549867][T11338] do_syscall_64+0xfd/0x6a0 [ 129.554392][T11338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 129.560479][T11338] RIP: 0033:0x413701 [ 129.564375][T11338] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 129.584156][T11338] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 129.592556][T11338] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 129.600517][T11338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce 23:27:38 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 129.608510][T11338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 129.616491][T11338] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 129.624456][T11338] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:38 executing program 2 (fault-call:0 fault-nth:14): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:38 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 129.819219][T11340] XFS (loop1): Invalid superblock magic number [ 129.821287][T11342] XFS (loop0): Invalid superblock magic number 23:27:38 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 129.970555][T11374] FAULT_INJECTION: forcing a failure. [ 129.970555][T11374] name failslab, interval 1, probability 0, space 0, times 0 23:27:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 130.072721][T11374] CPU: 0 PID: 11374 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 130.080398][T11374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.090468][T11374] Call Trace: [ 130.093782][T11374] dump_stack+0x172/0x1f0 [ 130.098144][T11374] should_fail.cold+0xa/0x15 [ 130.102766][T11374] ? fault_create_debugfs_attr+0x180/0x180 [ 130.108629][T11374] ? ___might_sleep+0x163/0x280 [ 130.113507][T11374] __should_failslab+0x121/0x190 [ 130.118459][T11374] should_failslab+0x9/0x14 [ 130.122972][T11374] kmem_cache_alloc+0x2aa/0x710 [ 130.127837][T11374] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 130.133755][T11374] ? rwlock_bug.part.0+0x90/0x90 [ 130.138728][T11374] __d_alloc+0x2e/0x8c0 [ 130.142906][T11374] d_alloc_anon+0x18/0x20 [ 130.147253][T11374] __ns_get_path.isra.0+0x308/0x770 [ 130.152462][T11374] ? group_pin_kill+0x1c0/0x1c0 [ 130.157324][T11374] ns_get_path_cb+0x33/0x70 [ 130.161829][T11374] ns_get_path+0x81/0xb0 [ 130.166067][T11374] ? ns_get_path_cb+0x70/0x70 [ 130.170843][T11374] ? do_raw_spin_unlock+0x57/0x270 [ 130.175973][T11374] ? _raw_spin_unlock+0x2d/0x50 [ 130.180848][T11374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.187111][T11374] proc_ns_get_link+0x170/0x1b0 [ 130.192151][T11374] ? proc_ns_readlink+0x240/0x240 [ 130.197207][T11374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.203447][T11374] ? security_inode_follow_link+0xe4/0x120 [ 130.209241][T11374] trailing_symlink+0x785/0x990 [ 130.214088][T11374] ? proc_ns_readlink+0x240/0x240 [ 130.219208][T11374] path_openat+0xa95/0x46d0 [ 130.223703][T11374] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 130.229518][T11374] ? kasan_slab_alloc+0xf/0x20 [ 130.234305][T11374] ? kmem_cache_alloc+0x121/0x710 [ 130.239320][T11374] ? getname_flags+0xd6/0x5b0 [ 130.243997][T11374] ? getname+0x1a/0x20 [ 130.248069][T11374] ? do_sys_open+0x2c9/0x5d0 [ 130.252653][T11374] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 130.258032][T11374] ? __alloc_fd+0x487/0x620 [ 130.262555][T11374] do_filp_open+0x1a1/0x280 [ 130.267102][T11374] ? may_open_dev+0x100/0x100 [ 130.271811][T11374] ? do_raw_spin_unlock+0x57/0x270 [ 130.276945][T11374] ? _raw_spin_unlock+0x2d/0x50 [ 130.281826][T11374] do_sys_open+0x3fe/0x5d0 [ 130.286250][T11374] ? filp_open+0x80/0x80 [ 130.290483][T11374] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 130.295929][T11374] ? do_syscall_64+0x26/0x6a0 [ 130.300601][T11374] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.306662][T11374] ? do_syscall_64+0x26/0x6a0 [ 130.311359][T11374] __x64_sys_open+0x7e/0xc0 [ 130.315877][T11374] do_syscall_64+0xfd/0x6a0 [ 130.320666][T11374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.326541][T11374] RIP: 0033:0x413701 [ 130.330433][T11374] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 130.350149][T11374] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 130.358568][T11374] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 130.366553][T11374] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 130.374526][T11374] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 130.382507][T11374] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 130.390466][T11374] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 130.489815][T11380] XFS (loop3): Invalid superblock magic number 23:27:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:39 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:39 executing program 2 (fault-call:0 fault-nth:15): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 130.609046][T11398] FAULT_INJECTION: forcing a failure. [ 130.609046][T11398] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 130.622291][T11398] CPU: 0 PID: 11398 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 130.622309][T11398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.622315][T11398] Call Trace: [ 130.622345][T11398] dump_stack+0x172/0x1f0 [ 130.622372][T11398] should_fail.cold+0xa/0x15 [ 130.647698][T11398] ? fault_create_debugfs_attr+0x180/0x180 23:27:39 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 130.647743][T11398] should_fail_alloc_page+0x50/0x60 [ 130.663318][T11398] __alloc_pages_nodemask+0x1a1/0x900 [ 130.668698][T11398] ? stack_trace_save+0xac/0xe0 [ 130.673538][T11398] ? stack_trace_consume_entry+0x190/0x190 [ 130.679333][T11398] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 130.685033][T11398] ? __kasan_check_read+0x11/0x20 [ 130.690269][T11398] ? mark_lock+0xc0/0x11e0 [ 130.694698][T11398] ? fault_create_debugfs_attr+0x180/0x180 [ 130.700515][T11398] cache_grow_begin+0x90/0xd20 [ 130.705266][T11398] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 130.710969][T11398] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 130.717192][T11398] __kmalloc+0x6b4/0x780 [ 130.721429][T11398] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 130.727150][T11398] tomoyo_realpath_from_path+0xcd/0x7b0 [ 130.732701][T11398] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 130.738946][T11398] tomoyo_check_open_permission+0x2a8/0x3f0 [ 130.744853][T11398] ? tomoyo_path_number_perm+0x520/0x520 [ 130.750487][T11398] ? ___might_sleep+0x163/0x280 [ 130.755350][T11398] ? inode_has_perm+0x230/0x230 [ 130.760191][T11398] ? rwlock_bug.part.0+0xc/0x90 [ 130.765056][T11398] tomoyo_file_open+0xa9/0xd0 [ 130.769747][T11398] security_file_open+0x71/0x300 [ 130.774677][T11398] do_dentry_open+0x373/0x1250 [ 130.779431][T11398] ? chown_common+0x5c0/0x5c0 [ 130.784108][T11398] ? inode_permission+0xb4/0x560 [ 130.789041][T11398] vfs_open+0xa0/0xd0 [ 130.793025][T11398] path_openat+0x10e9/0x46d0 [ 130.797621][T11398] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 130.803419][T11398] ? kasan_slab_alloc+0xf/0x20 [ 130.808196][T11398] ? kmem_cache_alloc+0x121/0x710 [ 130.813215][T11398] ? getname_flags+0xd6/0x5b0 [ 130.817882][T11398] ? getname+0x1a/0x20 [ 130.821936][T11398] ? do_sys_open+0x2c9/0x5d0 [ 130.826533][T11398] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 130.831922][T11398] ? __alloc_fd+0x487/0x620 [ 130.836455][T11398] do_filp_open+0x1a1/0x280 [ 130.840947][T11398] ? may_open_dev+0x100/0x100 [ 130.845631][T11398] ? do_raw_spin_unlock+0x57/0x270 [ 130.850922][T11398] ? _raw_spin_unlock+0x2d/0x50 [ 130.855793][T11398] do_sys_open+0x3fe/0x5d0 [ 130.860217][T11398] ? filp_open+0x80/0x80 [ 130.875002][T11398] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 130.884022][T11398] ? do_syscall_64+0x26/0x6a0 [ 130.890548][T11398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.910059][T11398] ? do_syscall_64+0x26/0x6a0 [ 130.914758][T11398] __x64_sys_open+0x7e/0xc0 [ 130.919262][T11398] do_syscall_64+0xfd/0x6a0 [ 130.923763][T11398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.929655][T11398] RIP: 0033:0x413701 [ 130.933551][T11398] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 130.953151][T11398] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 130.961553][T11398] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 130.969516][T11398] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 130.977477][T11398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 130.985438][T11398] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 130.993500][T11398] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:39 executing program 2 (fault-call:0 fault-nth:16): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 131.177677][T11407] FAULT_INJECTION: forcing a failure. [ 131.177677][T11407] name failslab, interval 1, probability 0, space 0, times 0 23:27:39 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 131.238517][T11407] CPU: 0 PID: 11407 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 131.246194][T11407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.256254][T11407] Call Trace: [ 131.259562][T11407] dump_stack+0x172/0x1f0 [ 131.263918][T11407] should_fail.cold+0xa/0x15 [ 131.268541][T11407] ? fault_create_debugfs_attr+0x180/0x180 [ 131.274371][T11407] ? ___might_sleep+0x163/0x280 [ 131.279242][T11407] __should_failslab+0x121/0x190 [ 131.284197][T11407] should_failslab+0x9/0x14 [ 131.288726][T11407] __kmalloc+0x2e0/0x780 [ 131.292996][T11407] ? tomoyo_encode2.part.0+0xf5/0x400 [ 131.298378][T11407] tomoyo_encode2.part.0+0xf5/0x400 [ 131.303566][T11407] tomoyo_encode+0x2b/0x50 [ 131.307980][T11407] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 131.313625][T11407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 131.319877][T11407] tomoyo_check_open_permission+0x2a8/0x3f0 [ 131.325760][T11407] ? tomoyo_path_number_perm+0x520/0x520 [ 131.331408][T11407] ? ___might_sleep+0x163/0x280 [ 131.336274][T11407] ? inode_has_perm+0x230/0x230 [ 131.341131][T11407] ? rwlock_bug.part.0+0xc/0x90 [ 131.346071][T11407] tomoyo_file_open+0xa9/0xd0 [ 131.350750][T11407] security_file_open+0x71/0x300 [ 131.355683][T11407] do_dentry_open+0x373/0x1250 [ 131.360456][T11407] ? chown_common+0x5c0/0x5c0 [ 131.365134][T11407] ? inode_permission+0xb4/0x560 [ 131.370074][T11407] vfs_open+0xa0/0xd0 [ 131.374053][T11407] path_openat+0x10e9/0x46d0 [ 131.378653][T11407] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 131.384465][T11407] ? kasan_slab_alloc+0xf/0x20 [ 131.389231][T11407] ? kmem_cache_alloc+0x121/0x710 [ 131.394238][T11407] ? getname_flags+0xd6/0x5b0 [ 131.398921][T11407] ? getname+0x1a/0x20 [ 131.403013][T11407] ? do_sys_open+0x2c9/0x5d0 [ 131.407597][T11407] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 131.412959][T11407] ? __alloc_fd+0x487/0x620 [ 131.417450][T11407] do_filp_open+0x1a1/0x280 [ 131.421938][T11407] ? may_open_dev+0x100/0x100 [ 131.426627][T11407] ? do_raw_spin_unlock+0x57/0x270 [ 131.431744][T11407] ? _raw_spin_unlock+0x2d/0x50 [ 131.436606][T11407] do_sys_open+0x3fe/0x5d0 [ 131.441106][T11407] ? filp_open+0x80/0x80 [ 131.445354][T11407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 131.450805][T11407] ? do_syscall_64+0x26/0x6a0 [ 131.455470][T11407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.461521][T11407] ? do_syscall_64+0x26/0x6a0 [ 131.466187][T11407] __x64_sys_open+0x7e/0xc0 [ 131.470699][T11407] do_syscall_64+0xfd/0x6a0 [ 131.475206][T11407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.481102][T11407] RIP: 0033:0x413701 [ 131.485018][T11407] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 131.504615][T11407] RSP: 002b:00007fe015217c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 131.513014][T11407] RAX: ffffffffffffffda RBX: 00007fe015217c90 RCX: 0000000000413701 [ 131.520973][T11407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 131.528930][T11407] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 131.536886][T11407] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fe0152186d4 [ 131.544868][T11407] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 131.554773][T11407] ERROR: Out of memory at tomoyo_realpath_from_path. 23:27:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:40 executing program 2 (fault-call:0 fault-nth:17): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 131.606274][T11408] XFS (loop1): Invalid superblock magic number [ 131.702303][T11428] FAULT_INJECTION: forcing a failure. [ 131.702303][T11428] name failslab, interval 1, probability 0, space 0, times 0 [ 131.715448][T11428] CPU: 0 PID: 11428 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 131.723103][T11428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.733165][T11428] Call Trace: [ 131.733203][T11428] dump_stack+0x172/0x1f0 [ 131.733232][T11428] should_fail.cold+0xa/0x15 [ 131.733257][T11428] ? fault_create_debugfs_attr+0x180/0x180 [ 131.733276][T11428] ? __kasan_check_read+0x11/0x20 [ 131.733306][T11428] ? mark_lock+0xc0/0x11e0 [ 131.740912][T11428] ? is_bpf_text_address+0xac/0x170 [ 131.740935][T11428] __should_failslab+0x121/0x190 [ 131.740955][T11428] should_failslab+0x9/0x14 [ 131.740972][T11428] kmem_cache_alloc+0x47/0x710 [ 131.740995][T11428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.786380][T11428] ebitmap_cpy+0xcd/0x270 [ 131.790722][T11428] ? hashtab_search+0x1b9/0x250 [ 131.790749][T11428] mls_compute_sid+0x5d0/0xf60 [ 131.790773][T11428] ? mls_convert_context+0x6d0/0x6d0 [ 131.790793][T11428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.790814][T11428] ? sidtab_search_core+0x164/0x210 [ 131.805736][T11428] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 131.805763][T11428] security_compute_sid.part.0+0xafd/0x1600 [ 131.805795][T11428] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 131.805809][T11428] ? __kasan_check_read+0x11/0x20 [ 131.805826][T11428] ? mark_lock+0xc0/0x11e0 [ 131.805844][T11428] ? __kasan_check_read+0x11/0x20 [ 131.805860][T11428] ? __lock_acquire+0x16f2/0x4690 [ 131.805882][T11428] ? finish_task_switch+0x147/0x720 [ 131.805904][T11428] ? find_held_lock+0x35/0x130 [ 131.860241][T11428] security_transition_sid+0x126/0x190 [ 131.860266][T11428] selinux_socket_create+0x453/0x610 [ 131.860287][T11428] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 131.881658][T11428] ? trace_hardirqs_on+0x67/0x240 [ 131.886697][T11428] ? __kasan_check_read+0x11/0x20 [ 131.891765][T11428] security_socket_create+0x7b/0xc0 [ 131.896979][T11428] __sock_create+0x90/0x730 23:27:40 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 131.901496][T11428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.901520][T11428] __sys_socket+0x103/0x220 [ 131.901538][T11428] ? move_addr_to_kernel+0x80/0x80 [ 131.901557][T11428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 131.901574][T11428] ? do_syscall_64+0x26/0x6a0 [ 131.901589][T11428] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.901604][T11428] ? do_syscall_64+0x26/0x6a0 [ 131.901629][T11428] __x64_sys_socket+0x73/0xb0 [ 131.942959][T11428] do_syscall_64+0xfd/0x6a0 23:27:40 executing program 2 (fault-call:0 fault-nth:18): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 131.944467][T11417] XFS (loop0): Invalid superblock magic number [ 131.947485][T11428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.947499][T11428] RIP: 0033:0x459819 [ 131.947516][T11428] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.947525][T11428] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 131.947540][T11428] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 131.947549][T11428] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 131.947559][T11428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 131.947568][T11428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 131.947578][T11428] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 132.155638][T11449] FAULT_INJECTION: forcing a failure. [ 132.155638][T11449] name failslab, interval 1, probability 0, space 0, times 0 [ 132.168654][T11449] CPU: 1 PID: 11449 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 132.176304][T11449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.186833][T11449] Call Trace: [ 132.190144][T11449] dump_stack+0x172/0x1f0 [ 132.194497][T11449] should_fail.cold+0xa/0x15 [ 132.199112][T11449] ? fault_create_debugfs_attr+0x180/0x180 [ 132.204930][T11449] ? __kasan_check_read+0x11/0x20 [ 132.209971][T11449] ? mark_lock+0xc0/0x11e0 [ 132.214396][T11449] ? is_bpf_text_address+0xac/0x170 [ 132.219614][T11449] __should_failslab+0x121/0x190 [ 132.224569][T11449] should_failslab+0x9/0x14 [ 132.229084][T11449] kmem_cache_alloc+0x47/0x710 [ 132.233865][T11449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.240125][T11449] ebitmap_cpy+0xcd/0x270 [ 132.244464][T11449] ? hashtab_search+0x1b9/0x250 [ 132.249335][T11449] mls_compute_sid+0x5d0/0xf60 [ 132.254131][T11449] ? mls_convert_context+0x6d0/0x6d0 [ 132.259444][T11449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.265705][T11449] ? sidtab_search_core+0x164/0x210 [ 132.270919][T11449] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 132.276701][T11449] security_compute_sid.part.0+0xafd/0x1600 [ 132.282625][T11449] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 132.289318][T11449] ? __kasan_check_read+0x11/0x20 [ 132.294377][T11449] ? avc_has_perm_noaudit+0x3b8/0x570 [ 132.299790][T11449] security_transition_sid+0x126/0x190 [ 132.305289][T11449] selinux_socket_create+0x453/0x610 [ 132.310594][T11449] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 132.316506][T11449] ? switch_task_namespaces+0x6c/0xd0 [ 132.321904][T11449] security_socket_create+0x7b/0xc0 [ 132.327119][T11449] __sock_create+0x90/0x730 [ 132.331637][T11449] ? lock_downgrade+0x920/0x920 [ 132.336509][T11449] __sys_socket+0x103/0x220 [ 132.341028][T11449] ? move_addr_to_kernel+0x80/0x80 [ 132.346154][T11449] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 132.351640][T11449] ? do_syscall_64+0x26/0x6a0 [ 132.356334][T11449] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.362417][T11449] ? do_syscall_64+0x26/0x6a0 [ 132.367114][T11449] __x64_sys_socket+0x73/0xb0 [ 132.371815][T11449] do_syscall_64+0xfd/0x6a0 [ 132.376337][T11449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.382260][T11449] RIP: 0033:0x459819 [ 132.386173][T11449] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.405881][T11449] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 132.414312][T11449] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 132.422294][T11449] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 132.430288][T11449] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 132.438273][T11449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 132.446258][T11449] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 132.497034][T11436] XFS (loop3): Invalid superblock magic number 23:27:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:41 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:41 executing program 2 (fault-call:0 fault-nth:19): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 132.694715][T11465] FAULT_INJECTION: forcing a failure. [ 132.694715][T11465] name failslab, interval 1, probability 0, space 0, times 0 [ 132.707453][T11465] CPU: 1 PID: 11465 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 132.707471][T11465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.725153][T11465] Call Trace: [ 132.728466][T11465] dump_stack+0x172/0x1f0 [ 132.732818][T11465] should_fail.cold+0xa/0x15 [ 132.737424][T11465] ? fault_create_debugfs_attr+0x180/0x180 [ 132.743257][T11465] __should_failslab+0x121/0x190 [ 132.748219][T11465] should_failslab+0x9/0x14 [ 132.752737][T11465] kmem_cache_alloc+0x47/0x710 [ 132.757512][T11465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.757537][T11465] ebitmap_cpy+0xcd/0x270 [ 132.757550][T11465] ? hashtab_search+0x1b9/0x250 [ 132.757573][T11465] mls_compute_sid+0x5d0/0xf60 [ 132.757595][T11465] ? mls_convert_context+0x6d0/0x6d0 [ 132.757618][T11465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.789272][T11465] ? sidtab_search_core+0x164/0x210 23:27:41 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 132.794491][T11465] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 132.800244][T11465] security_compute_sid.part.0+0xafd/0x1600 [ 132.806165][T11465] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 132.812851][T11465] ? __kasan_check_read+0x11/0x20 [ 132.817890][T11465] ? avc_has_perm_noaudit+0x3b8/0x570 [ 132.823293][T11465] security_transition_sid+0x126/0x190 [ 132.828781][T11465] selinux_socket_create+0x453/0x610 [ 132.834091][T11465] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 132.840001][T11465] ? switch_task_namespaces+0x6c/0xd0 [ 132.845398][T11465] security_socket_create+0x7b/0xc0 [ 132.850623][T11465] __sock_create+0x90/0x730 [ 132.855153][T11465] ? lock_downgrade+0x920/0x920 [ 132.860032][T11465] __sys_socket+0x103/0x220 [ 132.864558][T11465] ? move_addr_to_kernel+0x80/0x80 [ 132.869688][T11465] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 132.875153][T11465] ? do_syscall_64+0x26/0x6a0 [ 132.880081][T11465] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.886154][T11465] ? do_syscall_64+0x26/0x6a0 [ 132.890862][T11465] __x64_sys_socket+0x73/0xb0 [ 132.895556][T11465] do_syscall_64+0xfd/0x6a0 [ 132.900087][T11465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.905995][T11465] RIP: 0033:0x459819 [ 132.909915][T11465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.929526][T11465] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 132.937936][T11465] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 132.945923][T11465] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 132.953908][T11465] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 132.961884][T11465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 132.969866][T11465] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:41 executing program 2 (fault-call:0 fault-nth:20): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:41 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 133.122835][T11462] XFS (loop1): Invalid superblock magic number [ 133.320330][T11499] FAULT_INJECTION: forcing a failure. [ 133.320330][T11499] name failslab, interval 1, probability 0, space 0, times 0 [ 133.333127][T11499] CPU: 0 PID: 11499 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 133.340769][T11499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.350953][T11499] Call Trace: [ 133.354263][T11499] dump_stack+0x172/0x1f0 [ 133.358616][T11499] should_fail.cold+0xa/0x15 [ 133.363230][T11499] ? fault_create_debugfs_attr+0x180/0x180 [ 133.369064][T11499] __should_failslab+0x121/0x190 [ 133.374026][T11499] should_failslab+0x9/0x14 [ 133.378550][T11499] kmem_cache_alloc+0x47/0x710 [ 133.383329][T11499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 133.388814][T11499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 133.394315][T11499] ebitmap_cpy+0xcd/0x270 [ 133.398649][T11499] ? hashtab_search+0x1b9/0x250 [ 133.398674][T11499] mls_compute_sid+0x5d0/0xf60 [ 133.398697][T11499] ? mls_convert_context+0x6d0/0x6d0 [ 133.398734][T11499] security_compute_sid.part.0+0xafd/0x1600 [ 133.398764][T11499] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 133.398786][T11499] ? __kasan_check_read+0x11/0x20 [ 133.408513][T11499] ? avc_has_perm_noaudit+0x3b8/0x570 [ 133.408555][T11499] security_transition_sid+0x126/0x190 [ 133.408580][T11499] selinux_socket_create+0x453/0x610 [ 133.408600][T11499] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 133.408617][T11499] ? switch_task_namespaces+0x6c/0xd0 [ 133.408640][T11499] security_socket_create+0x7b/0xc0 [ 133.464197][T11499] __sock_create+0x90/0x730 [ 133.468740][T11499] ? lock_downgrade+0x920/0x920 [ 133.473616][T11499] __sys_socket+0x103/0x220 [ 133.478143][T11499] ? move_addr_to_kernel+0x80/0x80 [ 133.483356][T11499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 133.488830][T11499] ? do_syscall_64+0x26/0x6a0 [ 133.493518][T11499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.499685][T11499] ? do_syscall_64+0x26/0x6a0 [ 133.504388][T11499] __x64_sys_socket+0x73/0xb0 [ 133.509081][T11499] do_syscall_64+0xfd/0x6a0 [ 133.513694][T11499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.519804][T11499] RIP: 0033:0x459819 [ 133.523891][T11499] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 133.543620][T11499] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 133.552042][T11499] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 133.560019][T11499] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 23:27:42 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 133.568001][T11499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 133.575992][T11499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 133.584055][T11499] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 133.604587][T11479] XFS (loop0): Invalid superblock magic number [ 133.691954][T11491] XFS (loop3): Invalid superblock magic number 23:27:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:42 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:27:42 executing program 2 (fault-call:0 fault-nth:21): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 133.957309][T11522] XFS (loop1): Invalid superblock magic number 23:27:42 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 134.018743][T11534] FAULT_INJECTION: forcing a failure. [ 134.018743][T11534] name failslab, interval 1, probability 0, space 0, times 0 [ 134.055692][T11534] CPU: 0 PID: 11534 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 134.063456][T11534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.063464][T11534] Call Trace: [ 134.063489][T11534] dump_stack+0x172/0x1f0 [ 134.063516][T11534] should_fail.cold+0xa/0x15 [ 134.063541][T11534] ? fault_create_debugfs_attr+0x180/0x180 [ 134.063566][T11534] ? ___might_sleep+0x163/0x280 [ 134.063588][T11534] __should_failslab+0x121/0x190 [ 134.063605][T11534] ? sock_free_inode+0x30/0x30 [ 134.063623][T11534] should_failslab+0x9/0x14 [ 134.063639][T11534] kmem_cache_alloc+0x2aa/0x710 [ 134.063664][T11534] ? selinux_socket_create+0x2b2/0x610 [ 134.096528][T11534] ? sock_free_inode+0x30/0x30 [ 134.096544][T11534] sock_alloc_inode+0x1c/0x1d0 [ 134.096565][T11534] alloc_inode+0x68/0x1e0 [ 134.121028][T11534] new_inode_pseudo+0x19/0xf0 [ 134.121047][T11534] sock_alloc+0x41/0x270 [ 134.121065][T11534] __sock_create+0xc2/0x730 [ 134.121082][T11534] ? lock_downgrade+0x920/0x920 [ 134.121103][T11534] __sys_socket+0x103/0x220 [ 134.134952][T11534] ? move_addr_to_kernel+0x80/0x80 [ 134.134972][T11534] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 134.134988][T11534] ? do_syscall_64+0x26/0x6a0 [ 134.135003][T11534] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.135024][T11534] ? do_syscall_64+0x26/0x6a0 [ 134.183959][T11534] __x64_sys_socket+0x73/0xb0 [ 134.188664][T11534] do_syscall_64+0xfd/0x6a0 [ 134.193171][T11534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.199046][T11534] RIP: 0033:0x459819 [ 134.203097][T11534] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.223002][T11534] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 134.231424][T11534] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 134.239377][T11534] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 134.247331][T11534] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 134.255302][T11534] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 134.263259][T11534] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 134.272934][T11534] socket: no more sockets 23:27:43 executing program 2 (fault-call:0 fault-nth:22): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 134.313170][T11535] XFS (loop5): Invalid superblock magic number 23:27:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:43 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 134.507581][T11560] FAULT_INJECTION: forcing a failure. [ 134.507581][T11560] name failslab, interval 1, probability 0, space 0, times 0 [ 134.539383][T11551] XFS (loop0): Invalid superblock magic number [ 134.552675][T11560] CPU: 1 PID: 11560 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 134.560339][T11560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.570406][T11560] Call Trace: [ 134.573711][T11560] dump_stack+0x172/0x1f0 [ 134.578057][T11560] should_fail.cold+0xa/0x15 [ 134.582662][T11560] ? fault_create_debugfs_attr+0x180/0x180 [ 134.588475][T11560] ? ___might_sleep+0x163/0x280 [ 134.593334][T11560] __should_failslab+0x121/0x190 [ 134.598276][T11560] ? sock_free_inode+0x30/0x30 [ 134.603185][T11560] should_failslab+0x9/0x14 [ 134.607707][T11560] kmem_cache_alloc+0x2aa/0x710 [ 134.612567][T11560] ? selinux_socket_create+0x2b2/0x610 [ 134.618036][T11560] ? sock_free_inode+0x30/0x30 [ 134.622806][T11560] sock_alloc_inode+0x1c/0x1d0 [ 134.627577][T11560] alloc_inode+0x68/0x1e0 [ 134.631911][T11560] new_inode_pseudo+0x19/0xf0 [ 134.636588][T11560] sock_alloc+0x41/0x270 [ 134.640918][T11560] __sock_create+0xc2/0x730 [ 134.645424][T11560] ? lock_downgrade+0x920/0x920 [ 134.650283][T11560] __sys_socket+0x103/0x220 [ 134.654801][T11560] ? move_addr_to_kernel+0x80/0x80 [ 134.660012][T11560] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 134.665479][T11560] ? do_syscall_64+0x26/0x6a0 [ 134.670160][T11560] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.676241][T11560] ? do_syscall_64+0x26/0x6a0 [ 134.680927][T11560] __x64_sys_socket+0x73/0xb0 [ 134.685615][T11560] do_syscall_64+0xfd/0x6a0 [ 134.690128][T11560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.696019][T11560] RIP: 0033:0x459819 [ 134.699936][T11560] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.719629][T11560] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 134.728048][T11560] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 134.736027][T11560] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 134.744013][T11560] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:27:43 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 134.752088][T11560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 134.760169][T11560] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 134.816048][T11560] socket: no more sockets 23:27:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 134.898623][T11566] XFS (loop3): Invalid superblock magic number 23:27:43 executing program 2 (fault-call:0 fault-nth:23): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 135.107862][T11581] XFS (loop1): Invalid superblock magic number 23:27:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:43 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 135.189310][T11598] FAULT_INJECTION: forcing a failure. [ 135.189310][T11598] name failslab, interval 1, probability 0, space 0, times 0 [ 135.230946][T11590] XFS (loop5): Invalid superblock magic number [ 135.275698][T11598] CPU: 0 PID: 11598 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 135.283459][T11598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.293615][T11598] Call Trace: [ 135.296899][T11598] dump_stack+0x172/0x1f0 [ 135.301238][T11598] should_fail.cold+0xa/0x15 [ 135.305824][T11598] ? fault_create_debugfs_attr+0x180/0x180 [ 135.311629][T11598] ? __kasan_check_read+0x11/0x20 [ 135.316669][T11598] __should_failslab+0x121/0x190 [ 135.321758][T11598] should_failslab+0x9/0x14 [ 135.326249][T11598] __kmalloc+0x71/0x780 [ 135.330395][T11598] ? find_held_lock+0x35/0x130 [ 135.335145][T11598] ? __sock_create+0x382/0x730 [ 135.339894][T11598] ? sk_prot_alloc+0x23a/0x310 [ 135.344646][T11598] sk_prot_alloc+0x23a/0x310 [ 135.349224][T11598] sk_alloc+0x39/0xf70 [ 135.353312][T11598] ax25_create+0xfc/0x310 [ 135.357642][T11598] __sock_create+0x3d8/0x730 [ 135.362227][T11598] ? lock_downgrade+0x920/0x920 [ 135.367074][T11598] __sys_socket+0x103/0x220 [ 135.371577][T11598] ? move_addr_to_kernel+0x80/0x80 [ 135.376686][T11598] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 135.382143][T11598] ? do_syscall_64+0x26/0x6a0 [ 135.386806][T11598] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.392859][T11598] ? do_syscall_64+0x26/0x6a0 [ 135.397535][T11598] __x64_sys_socket+0x73/0xb0 [ 135.402314][T11598] do_syscall_64+0xfd/0x6a0 [ 135.407019][T11598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.412915][T11598] RIP: 0033:0x459819 [ 135.416809][T11598] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.437939][T11598] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 135.446337][T11598] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 135.454298][T11598] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 135.462272][T11598] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:27:44 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 135.470251][T11598] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 135.478231][T11598] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:44 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:44 executing program 2 (fault-call:0 fault-nth:24): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 135.625986][T11609] XFS (loop0): Invalid superblock magic number 23:27:44 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 135.782289][T11627] FAULT_INJECTION: forcing a failure. [ 135.782289][T11627] name failslab, interval 1, probability 0, space 0, times 0 23:27:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 135.893174][T11627] CPU: 1 PID: 11627 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 135.900858][T11627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.910923][T11627] Call Trace: [ 135.914248][T11627] dump_stack+0x172/0x1f0 [ 135.918609][T11627] should_fail.cold+0xa/0x15 [ 135.923237][T11627] ? fault_create_debugfs_attr+0x180/0x180 [ 135.929148][T11627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.935403][T11627] ? should_fail+0x1de/0x852 [ 135.940011][T11627] __should_failslab+0x121/0x190 [ 135.944968][T11627] should_failslab+0x9/0x14 [ 135.949753][T11627] kmem_cache_alloc_trace+0x4b/0x790 [ 135.955150][T11627] selinux_sk_alloc_security+0x87/0x1c0 [ 135.960699][T11627] security_sk_alloc+0x77/0xc0 [ 135.965477][T11627] sk_prot_alloc+0x259/0x310 [ 135.970089][T11627] sk_alloc+0x39/0xf70 [ 135.974177][T11627] ax25_create+0xfc/0x310 [ 135.978523][T11627] __sock_create+0x3d8/0x730 [ 135.983135][T11627] ? lock_downgrade+0x920/0x920 [ 135.988000][T11627] __sys_socket+0x103/0x220 [ 135.992527][T11627] ? move_addr_to_kernel+0x80/0x80 [ 135.997646][T11627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 136.003115][T11627] ? do_syscall_64+0x26/0x6a0 [ 136.007793][T11627] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.013864][T11627] ? do_syscall_64+0x26/0x6a0 [ 136.017636][T11625] XFS (loop3): Invalid superblock magic number [ 136.018552][T11627] __x64_sys_socket+0x73/0xb0 [ 136.018573][T11627] do_syscall_64+0xfd/0x6a0 [ 136.018596][T11627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.039800][T11627] RIP: 0033:0x459819 [ 136.043692][T11627] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.063323][T11627] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 136.071752][T11627] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 136.079728][T11627] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 23:27:44 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:44 executing program 2 (fault-call:0 fault-nth:25): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 136.087714][T11627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 136.095687][T11627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 136.103672][T11627] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:45 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 136.311496][T11638] XFS (loop1): Invalid superblock magic number [ 136.319410][T11660] FAULT_INJECTION: forcing a failure. [ 136.319410][T11660] name failslab, interval 1, probability 0, space 0, times 0 [ 136.356786][T11645] XFS (loop5): Invalid superblock magic number 23:27:45 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 136.480524][T11660] CPU: 1 PID: 11660 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 136.488183][T11660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.498235][T11660] Call Trace: [ 136.501517][T11660] dump_stack+0x172/0x1f0 [ 136.505854][T11660] should_fail.cold+0xa/0x15 [ 136.510450][T11660] ? fault_create_debugfs_attr+0x180/0x180 [ 136.516261][T11660] ? sk_alloc+0x5d7/0xf70 [ 136.520616][T11660] __should_failslab+0x121/0x190 [ 136.525575][T11660] should_failslab+0x9/0x14 [ 136.530080][T11660] kmem_cache_alloc_trace+0x4b/0x790 [ 136.535363][T11660] ? __kasan_check_read+0x11/0x20 [ 136.540386][T11660] ax25_create_cb+0x43/0x6a0 [ 136.544977][T11660] ax25_create+0x112/0x310 [ 136.549391][T11660] __sock_create+0x3d8/0x730 [ 136.553993][T11660] ? lock_downgrade+0x920/0x920 [ 136.558865][T11660] __sys_socket+0x103/0x220 [ 136.563368][T11660] ? move_addr_to_kernel+0x80/0x80 [ 136.568839][T11660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 136.574310][T11660] ? do_syscall_64+0x26/0x6a0 [ 136.578986][T11660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.585052][T11660] ? do_syscall_64+0x26/0x6a0 [ 136.589741][T11660] __x64_sys_socket+0x73/0xb0 [ 136.594436][T11660] do_syscall_64+0xfd/0x6a0 [ 136.598941][T11660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.605008][T11660] RIP: 0033:0x459819 [ 136.608922][T11660] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.628623][T11660] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 136.637034][T11660] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 136.645014][T11660] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 136.652998][T11660] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 136.660996][T11660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 136.668957][T11660] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:45 executing program 2 (fault-call:0 fault-nth:26): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:45 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 136.798010][T11667] XFS (loop0): Invalid superblock magic number 23:27:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 136.919005][T11681] FAULT_INJECTION: forcing a failure. [ 136.919005][T11681] name failslab, interval 1, probability 0, space 0, times 0 [ 136.931747][T11681] CPU: 1 PID: 11681 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 136.939399][T11681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.949464][T11681] Call Trace: [ 136.952779][T11681] dump_stack+0x172/0x1f0 [ 136.957139][T11681] should_fail.cold+0xa/0x15 [ 136.961745][T11681] ? lock_downgrade+0x920/0x920 [ 136.966611][T11681] ? fault_create_debugfs_attr+0x180/0x180 [ 136.972443][T11681] __should_failslab+0x121/0x190 [ 136.977486][T11681] should_failslab+0x9/0x14 [ 136.982006][T11681] kmem_cache_alloc+0x47/0x710 [ 136.986782][T11681] ? unwind_get_return_address+0x61/0xa0 [ 136.992695][T11681] ? profile_setup.cold+0xbb/0xbb [ 136.997735][T11681] ebitmap_cpy+0xcd/0x270 [ 137.002073][T11681] ? hashtab_search+0x1b9/0x250 [ 137.006944][T11681] mls_compute_sid+0x5d0/0xf60 [ 137.011814][T11681] ? mls_convert_context+0x6d0/0x6d0 [ 137.017124][T11681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.023387][T11681] ? sidtab_search_core+0x164/0x210 [ 137.028609][T11681] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 137.034350][T11681] security_compute_sid.part.0+0xafd/0x1600 [ 137.045503][T11681] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 137.052207][T11681] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 137.058147][T11681] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 137.058167][T11681] ? lockdep_hardirqs_on+0x418/0x5d0 23:27:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:45 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 137.058184][T11681] ? trace_hardirqs_on+0x67/0x240 [ 137.058198][T11681] ? __kasan_check_read+0x11/0x20 [ 137.058231][T11681] ? should_fail+0x1de/0x852 [ 137.058256][T11681] ? sk_alloc+0x5d7/0xf70 [ 137.088752][T11681] security_transition_sid+0x126/0x190 [ 137.094247][T11681] selinux_socket_post_create+0x6a6/0x880 [ 137.099983][T11681] ? selinux_bprm_set_creds+0xc90/0xc90 [ 137.105540][T11681] ? lockdep_init_map+0x1be/0x6d0 [ 137.110579][T11681] security_socket_post_create+0x83/0xd0 [ 137.110603][T11681] __sock_create+0x5b1/0x730 [ 137.110627][T11681] __sys_socket+0x103/0x220 [ 137.110644][T11681] ? move_addr_to_kernel+0x80/0x80 [ 137.110667][T11681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 137.135989][T11681] ? do_syscall_64+0x26/0x6a0 [ 137.140671][T11681] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.146747][T11681] ? do_syscall_64+0x26/0x6a0 [ 137.151445][T11681] __x64_sys_socket+0x73/0xb0 [ 137.156142][T11681] do_syscall_64+0xfd/0x6a0 [ 137.160665][T11681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.166566][T11681] RIP: 0033:0x459819 23:27:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 137.170476][T11681] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 137.192244][T11681] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 137.200680][T11681] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 137.208663][T11681] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 137.216660][T11681] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 137.224643][T11681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 137.232623][T11681] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:45 executing program 2 (fault-call:0 fault-nth:27): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 137.263416][T11689] XFS (loop3): Invalid superblock magic number 23:27:46 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 137.376709][T11701] XFS (loop5): Invalid superblock magic number [ 137.472702][T11714] FAULT_INJECTION: forcing a failure. [ 137.472702][T11714] name failslab, interval 1, probability 0, space 0, times 0 [ 137.485679][T11714] CPU: 1 PID: 11714 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 137.493322][T11714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.503476][T11714] Call Trace: [ 137.506815][T11714] dump_stack+0x172/0x1f0 [ 137.511192][T11714] should_fail.cold+0xa/0x15 [ 137.515805][T11714] ? lock_downgrade+0x920/0x920 23:27:46 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 137.520686][T11714] ? fault_create_debugfs_attr+0x180/0x180 [ 137.526523][T11714] __should_failslab+0x121/0x190 [ 137.531480][T11714] should_failslab+0x9/0x14 [ 137.535997][T11714] kmem_cache_alloc+0x47/0x710 [ 137.540777][T11714] ? unwind_get_return_address+0x61/0xa0 [ 137.546427][T11714] ? profile_setup.cold+0xbb/0xbb [ 137.551454][T11714] ebitmap_cpy+0xcd/0x270 [ 137.555803][T11714] ? hashtab_search+0x1b9/0x250 [ 137.560679][T11714] mls_compute_sid+0x5d0/0xf60 [ 137.565465][T11714] ? mls_convert_context+0x6d0/0x6d0 [ 137.570774][T11714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.577299][T11714] ? sidtab_search_core+0x164/0x210 [ 137.582517][T11714] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 137.588273][T11714] security_compute_sid.part.0+0xafd/0x1600 [ 137.594288][T11714] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 137.600990][T11714] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 137.606805][T11714] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 137.612651][T11714] ? lockdep_hardirqs_on+0x418/0x5d0 [ 137.617974][T11714] ? trace_hardirqs_on+0x67/0x240 [ 137.623015][T11714] ? __kasan_check_read+0x11/0x20 [ 137.628058][T11714] ? should_fail+0x1de/0x852 [ 137.632671][T11714] ? sk_alloc+0x5d7/0xf70 [ 137.637183][T11714] security_transition_sid+0x126/0x190 [ 137.642654][T11714] selinux_socket_post_create+0x6a6/0x880 [ 137.648418][T11714] ? selinux_bprm_set_creds+0xc90/0xc90 [ 137.654016][T11714] ? lockdep_init_map+0x1be/0x6d0 [ 137.659071][T11714] security_socket_post_create+0x83/0xd0 [ 137.664770][T11714] __sock_create+0x5b1/0x730 [ 137.669558][T11714] __sys_socket+0x103/0x220 [ 137.674070][T11714] ? move_addr_to_kernel+0x80/0x80 [ 137.679194][T11714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 137.684805][T11714] ? do_syscall_64+0x26/0x6a0 [ 137.689498][T11714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.695570][T11714] ? do_syscall_64+0x26/0x6a0 [ 137.700409][T11714] __x64_sys_socket+0x73/0xb0 [ 137.705093][T11714] do_syscall_64+0xfd/0x6a0 [ 137.709609][T11714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.715508][T11714] RIP: 0033:0x459819 [ 137.719388][T11714] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 137.739266][T11714] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 137.747686][T11714] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 137.755666][T11714] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 137.763651][T11714] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:27:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 137.771627][T11714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 137.779602][T11714] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:46 executing program 2 (fault-call:0 fault-nth:28): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:46 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 137.999296][T11715] XFS (loop1): Invalid superblock magic number [ 138.004681][T11732] FAULT_INJECTION: forcing a failure. [ 138.004681][T11732] name failslab, interval 1, probability 0, space 0, times 0 [ 138.052724][T11732] CPU: 0 PID: 11732 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 138.060406][T11732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.070476][T11732] Call Trace: [ 138.073880][T11732] dump_stack+0x172/0x1f0 [ 138.078247][T11732] should_fail.cold+0xa/0x15 [ 138.082866][T11732] ? fault_create_debugfs_attr+0x180/0x180 [ 138.088712][T11732] ? ___might_sleep+0x163/0x280 [ 138.093593][T11732] __should_failslab+0x121/0x190 [ 138.098551][T11732] should_failslab+0x9/0x14 23:27:46 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 138.103080][T11732] kmem_cache_alloc+0x2aa/0x710 [ 138.107962][T11732] ? __alloc_fd+0x487/0x620 [ 138.112458][T11732] __d_alloc+0x2e/0x8c0 [ 138.116599][T11732] ? lock_downgrade+0x920/0x920 [ 138.121434][T11732] d_alloc_pseudo+0x1e/0x70 [ 138.125924][T11732] alloc_file_pseudo+0xe2/0x280 [ 138.130761][T11732] ? __kasan_check_read+0x11/0x20 [ 138.135794][T11732] ? alloc_file+0x4d0/0x4d0 [ 138.140285][T11732] ? __alloc_fd+0x487/0x620 [ 138.144778][T11732] sock_alloc_file+0x50/0x180 [ 138.149445][T11732] __sys_socket+0x150/0x220 [ 138.153936][T11732] ? move_addr_to_kernel+0x80/0x80 [ 138.159055][T11732] ? do_syscall_64+0x26/0x6a0 [ 138.163773][T11732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.169828][T11732] ? do_syscall_64+0x26/0x6a0 [ 138.174500][T11732] __x64_sys_socket+0x73/0xb0 [ 138.179197][T11732] do_syscall_64+0xfd/0x6a0 [ 138.183733][T11732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.189624][T11732] RIP: 0033:0x459819 [ 138.193515][T11732] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.213218][T11732] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 138.221883][T11732] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 138.229866][T11732] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 138.237846][T11732] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 138.245810][T11732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 23:27:46 executing program 2 (fault-call:0 fault-nth:29): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 138.253782][T11732] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:27:47 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 138.522206][T11736] XFS (loop0): Invalid superblock magic number [ 138.532553][T11756] FAULT_INJECTION: forcing a failure. [ 138.532553][T11756] name failslab, interval 1, probability 0, space 0, times 0 23:27:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 138.611337][T11753] XFS (loop3): Invalid superblock magic number [ 138.632896][T11756] CPU: 1 PID: 11756 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 138.640570][T11756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.650636][T11756] Call Trace: [ 138.653951][T11756] dump_stack+0x172/0x1f0 23:27:47 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 138.658321][T11756] should_fail.cold+0xa/0x15 [ 138.662941][T11756] ? fault_create_debugfs_attr+0x180/0x180 [ 138.668801][T11756] ? ___might_sleep+0x163/0x280 [ 138.673679][T11756] __should_failslab+0x121/0x190 [ 138.678645][T11756] should_failslab+0x9/0x14 [ 138.683167][T11756] kmem_cache_alloc+0x2aa/0x710 [ 138.688043][T11756] ? __alloc_fd+0x487/0x620 [ 138.692566][T11756] __d_alloc+0x2e/0x8c0 [ 138.696851][T11756] ? lock_downgrade+0x920/0x920 [ 138.701804][T11756] d_alloc_pseudo+0x1e/0x70 [ 138.706485][T11756] alloc_file_pseudo+0xe2/0x280 [ 138.711452][T11756] ? __kasan_check_read+0x11/0x20 [ 138.716493][T11756] ? alloc_file+0x4d0/0x4d0 [ 138.721019][T11756] ? __alloc_fd+0x487/0x620 [ 138.725554][T11756] sock_alloc_file+0x50/0x180 [ 138.730269][T11756] __sys_socket+0x150/0x220 [ 138.734798][T11756] ? move_addr_to_kernel+0x80/0x80 [ 138.739931][T11756] ? do_syscall_64+0x26/0x6a0 [ 138.744626][T11756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.750710][T11756] ? do_syscall_64+0x26/0x6a0 [ 138.755412][T11756] __x64_sys_socket+0x73/0xb0 [ 138.760113][T11756] do_syscall_64+0xfd/0x6a0 [ 138.764653][T11756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.771286][T11756] RIP: 0033:0x459819 [ 138.775201][T11756] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.794938][T11756] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 138.803631][T11756] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 138.811624][T11756] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 138.819618][T11756] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 138.828659][T11756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 138.828669][T11756] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:47 executing program 2 (fault-call:0 fault-nth:30): syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:27:47 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 138.974764][T11767] XFS (loop5): Invalid superblock magic number [ 139.046533][T11790] FAULT_INJECTION: forcing a failure. [ 139.046533][T11790] name failslab, interval 1, probability 0, space 0, times 0 [ 139.063040][T11778] XFS (loop1): device supports 512 byte sectors (not 0) [ 139.072268][T11790] CPU: 1 PID: 11790 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 139.079923][T11790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.089991][T11790] Call Trace: [ 139.093314][T11790] dump_stack+0x172/0x1f0 [ 139.097673][T11790] should_fail.cold+0xa/0x15 [ 139.102274][T11790] ? fault_create_debugfs_attr+0x180/0x180 [ 139.108096][T11790] ? ___might_sleep+0x163/0x280 [ 139.119121][T11790] __should_failslab+0x121/0x190 [ 139.124095][T11790] should_failslab+0x9/0x14 [ 139.128615][T11790] kmem_cache_alloc+0x2aa/0x710 [ 139.133472][T11790] ? __alloc_fd+0x487/0x620 [ 139.137965][T11790] __d_alloc+0x2e/0x8c0 [ 139.142126][T11790] ? lock_downgrade+0x920/0x920 [ 139.146983][T11790] d_alloc_pseudo+0x1e/0x70 [ 139.151489][T11790] alloc_file_pseudo+0xe2/0x280 [ 139.156329][T11790] ? __kasan_check_read+0x11/0x20 [ 139.161341][T11790] ? alloc_file+0x4d0/0x4d0 [ 139.165852][T11790] ? __alloc_fd+0x487/0x620 [ 139.170358][T11790] sock_alloc_file+0x50/0x180 [ 139.175022][T11790] __sys_socket+0x150/0x220 [ 139.179522][T11790] ? move_addr_to_kernel+0x80/0x80 [ 139.184642][T11790] ? do_syscall_64+0x26/0x6a0 [ 139.190866][T11790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.196960][T11790] ? do_syscall_64+0x26/0x6a0 [ 139.201667][T11790] __x64_sys_socket+0x73/0xb0 [ 139.206384][T11790] do_syscall_64+0xfd/0x6a0 [ 139.210896][T11790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.216779][T11790] RIP: 0033:0x459819 [ 139.220660][T11790] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:27:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:47 executing program 2 (fault-call:0 fault-nth:31): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 139.240251][T11790] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 139.248667][T11790] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 139.256634][T11790] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 139.264601][T11790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 139.272577][T11790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 139.280565][T11790] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 139.458334][T11799] FAULT_INJECTION: forcing a failure. [ 139.458334][T11799] name failslab, interval 1, probability 0, space 0, times 0 23:27:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 139.502540][T11799] CPU: 0 PID: 11799 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 139.510231][T11799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.520300][T11799] Call Trace: [ 139.523616][T11799] dump_stack+0x172/0x1f0 [ 139.528057][T11799] should_fail.cold+0xa/0x15 [ 139.532651][T11799] ? fault_create_debugfs_attr+0x180/0x180 [ 139.538460][T11799] ? ___might_sleep+0x163/0x280 [ 139.543300][T11799] __should_failslab+0x121/0x190 [ 139.548631][T11799] should_failslab+0x9/0x14 [ 139.553129][T11799] kmem_cache_alloc+0x2aa/0x710 [ 139.558158][T11799] ? rwlock_bug.part.0+0x90/0x90 [ 139.563088][T11799] ? lock_downgrade+0x920/0x920 [ 139.568031][T11799] __alloc_file+0x27/0x300 [ 139.572444][T11799] alloc_empty_file+0x72/0x170 [ 139.577221][T11799] alloc_file+0x5e/0x4d0 [ 139.582401][T11799] alloc_file_pseudo+0x189/0x280 [ 139.587352][T11799] ? alloc_file+0x4d0/0x4d0 [ 139.591852][T11799] ? __alloc_fd+0x487/0x620 [ 139.596339][T11799] sock_alloc_file+0x50/0x180 [ 139.600994][T11799] __sys_socket+0x150/0x220 [ 139.605481][T11799] ? move_addr_to_kernel+0x80/0x80 [ 139.610805][T11799] ? do_syscall_64+0x26/0x6a0 [ 139.615465][T11799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.621510][T11799] ? do_syscall_64+0x26/0x6a0 [ 139.626176][T11799] __x64_sys_socket+0x73/0xb0 [ 139.630834][T11799] do_syscall_64+0xfd/0x6a0 [ 139.635324][T11799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.641199][T11799] RIP: 0033:0x459819 [ 139.645078][T11799] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.665006][T11799] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 139.673765][T11799] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 139.682033][T11799] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 139.690018][T11799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:27:48 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:48 executing program 2 (fault-call:0 fault-nth:32): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 139.697981][T11799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 139.705960][T11799] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 139.879956][T11811] FAULT_INJECTION: forcing a failure. [ 139.879956][T11811] name failslab, interval 1, probability 0, space 0, times 0 [ 139.939477][T11800] XFS (loop0): Invalid superblock magic number [ 139.952900][T11811] CPU: 1 PID: 11811 Comm: syz-executor.2 Not tainted 5.2.0+ #56 [ 139.960582][T11811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.970651][T11811] Call Trace: [ 139.974072][T11811] dump_stack+0x172/0x1f0 [ 139.978431][T11811] should_fail.cold+0xa/0x15 [ 139.983050][T11811] ? fault_create_debugfs_attr+0x180/0x180 [ 139.988895][T11811] ? ___might_sleep+0x163/0x280 [ 139.993769][T11811] __should_failslab+0x121/0x190 [ 139.998732][T11811] should_failslab+0x9/0x14 [ 140.003258][T11811] kmem_cache_alloc+0x2aa/0x710 [ 140.008127][T11811] ? rcu_read_lock_sched_held+0x110/0x130 [ 140.013866][T11811] ? kmem_cache_alloc+0x364/0x710 [ 140.018910][T11811] security_file_alloc+0x39/0x170 [ 140.023955][T11811] __alloc_file+0xac/0x300 [ 140.028381][T11811] alloc_empty_file+0x72/0x170 [ 140.033158][T11811] alloc_file+0x5e/0x4d0 [ 140.037419][T11811] alloc_file_pseudo+0x189/0x280 [ 140.042368][T11811] ? alloc_file+0x4d0/0x4d0 [ 140.046891][T11811] ? __alloc_fd+0x487/0x620 [ 140.051421][T11811] sock_alloc_file+0x50/0x180 [ 140.056120][T11811] __sys_socket+0x150/0x220 [ 140.060650][T11811] ? move_addr_to_kernel+0x80/0x80 [ 140.065782][T11811] ? do_syscall_64+0x26/0x6a0 [ 140.070471][T11811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.076552][T11811] ? do_syscall_64+0x26/0x6a0 [ 140.081262][T11811] __x64_sys_socket+0x73/0xb0 [ 140.085964][T11811] do_syscall_64+0xfd/0x6a0 23:27:48 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:48 executing program 2 (fault-call:0 fault-nth:33): syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 140.090489][T11811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.096394][T11811] RIP: 0033:0x459819 [ 140.098499][T11804] XFS (loop3): Invalid superblock magic number [ 140.100298][T11811] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.100308][T11811] RSP: 002b:00007fe015217c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 140.100324][T11811] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 140.100333][T11811] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 140.100343][T11811] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 140.100352][T11811] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0152186d4 [ 140.100362][T11811] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:27:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 140.318026][T11824] XFS (loop5): Invalid superblock magic number 23:27:49 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 140.398819][T11832] XFS (loop1): device supports 512 byte sectors (not 0) 23:27:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:49 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 140.881661][T11862] XFS (loop0): Invalid superblock magic number 23:27:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:49 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) [ 140.993545][T11877] XFS (loop5): Invalid superblock magic number [ 141.032064][T11880] XFS (loop3): Invalid superblock magic number 23:27:49 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) [ 141.159582][T11896] XFS (loop1): device supports 512 byte sectors (not 0) 23:27:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:50 executing program 2: syz_init_net_socket$ax25(0x6, 0x3, 0x0) 23:27:50 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:50 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:27:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 141.727835][T11926] XFS (loop0): Invalid superblock magic number 23:27:50 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:50 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 141.773522][T11933] XFS (loop5): Invalid superblock magic number [ 141.798751][T11940] XFS (loop3): Invalid superblock magic number 23:27:50 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:50 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 142.026449][T11965] XFS (loop1): device supports 512 byte sectors (not 0) 23:27:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:51 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:51 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 142.331017][T11977] XFS (loop0): Invalid superblock magic number 23:27:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 142.501516][T11994] XFS (loop5): Invalid superblock magic number 23:27:51 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:51 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 142.647930][T12019] XFS (loop1): device supports 512 byte sectors (not 0) [ 142.656005][T12005] XFS (loop3): Invalid superblock magic number 23:27:51 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:51 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:51 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:51 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:27:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:51 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:51 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) [ 143.184136][T12044] XFS (loop0): device supports 512 byte sectors (not 0) [ 143.245169][T12051] XFS (loop5): Invalid superblock magic number 23:27:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:52 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) [ 143.396927][T12070] XFS (loop1): device supports 512 byte sectors (not 0) [ 143.417590][T12067] XFS (loop3): Invalid superblock magic number 23:27:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:27:52 executing program 2: syz_init_net_socket$ax25(0xffffffffffffffff, 0x3, 0x0) 23:27:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:27:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:52 executing program 2: syz_init_net_socket$ax25(0x3, 0x2, 0x0) [ 143.971162][T12107] XFS (loop5): Invalid superblock magic number [ 143.988346][T12109] XFS (loop0): device supports 512 byte sectors (not 0) [ 144.039379][T12112] XFS (loop3): Invalid superblock magic number 23:27:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:52 executing program 2: syz_init_net_socket$ax25(0x3, 0x4, 0x0) 23:27:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 144.214226][ T5] XFS (loop1): SB sanity check failed [ 144.231141][ T5] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 144.300640][ T5] XFS (loop1): Unmount and run xfs_repair [ 144.317828][ T5] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 144.325757][ T5] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 144.335303][ T5] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 144.344760][ T5] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 144.354253][ T5] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 144.363633][ T5] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 144.372961][ T5] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 144.382074][ T5] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 144.396038][ T5] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 144.405577][T12139] XFS (loop1): SB validate failed with error -117. 23:27:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:53 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:53 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:27:53 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:27:53 executing program 2: syz_init_net_socket$ax25(0x3, 0x6, 0x0) [ 144.912085][T12167] XFS (loop3): Invalid superblock magic number [ 144.993242][T12179] XFS (loop0): device supports 512 byte sectors (not 0) [ 145.003452][T12171] XFS (loop5): Invalid superblock magic number 23:27:53 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:53 executing program 2: syz_init_net_socket$ax25(0x3, 0xa, 0x0) 23:27:53 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 145.279895][ T22] XFS (loop1): SB sanity check failed [ 145.290319][ T22] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:27:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 145.342711][ T22] XFS (loop1): Unmount and run xfs_repair [ 145.356722][ T22] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 145.370274][ T22] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 145.381266][ T22] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 145.399437][ T22] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 145.417940][ T22] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 145.427484][ T22] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 145.436577][ T22] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 145.445678][ T22] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 145.454639][ T22] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 145.463737][T12203] XFS (loop1): SB validate failed with error -117. 23:27:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:54 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:27:54 executing program 2: syz_init_net_socket$ax25(0x3, 0xf, 0x0) 23:27:54 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:54 executing program 2: syz_init_net_socket$ax25(0x3, 0x10, 0x0) [ 145.740843][T12225] XFS (loop3): Invalid superblock magic number [ 145.891922][T12238] XFS (loop5): Invalid superblock magic number 23:27:54 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 145.934243][T12242] XFS (loop0): device supports 512 byte sectors (not 0) 23:27:54 executing program 2: syz_init_net_socket$ax25(0x3, 0x11, 0x0) 23:27:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:54 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:27:55 executing program 2: syz_init_net_socket$ax25(0x3, 0x1b, 0x0) [ 146.343330][T12270] XFS (loop1): SB sanity check failed [ 146.348808][T12270] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:27:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:27:55 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 146.483725][T12270] XFS (loop1): Unmount and run xfs_repair [ 146.522713][T12285] XFS (loop3): device supports 512 byte sectors (not 0) [ 146.541975][T12270] XFS (loop1): First 128 bytes of corrupted metadata buffer: 23:27:55 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:55 executing program 2: syz_init_net_socket$ax25(0x3, 0x2c, 0x0) [ 146.628730][T12270] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 146.664694][T12301] XFS (loop0): device supports 512 byte sectors (not 0) [ 146.672558][T12270] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 146.692174][T12270] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 146.741671][T12270] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 146.787935][T12311] XFS (loop5): Invalid superblock magic number [ 146.819242][T12270] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 23:27:55 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:55 executing program 2: syz_init_net_socket$ax25(0x3, 0x38, 0x0) [ 146.856751][T12270] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 146.892545][T12270] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 146.945569][T12270] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 147.045448][T12270] XFS (loop1): SB validate failed with error -117. 23:27:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:27:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:27:56 executing program 2: syz_init_net_socket$ax25(0x3, 0x109, 0x0) 23:27:56 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:56 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:56 executing program 2: syz_init_net_socket$ax25(0x3, 0x223, 0x0) [ 147.569697][T12348] XFS (loop0): device supports 512 byte sectors (not 0) 23:27:56 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 147.707643][T12346] XFS (loop5): device supports 512 byte sectors (not 0) [ 147.747344][T12350] XFS (loop3): device supports 512 byte sectors (not 0) 23:27:56 executing program 2: syz_init_net_socket$ax25(0x3, 0x4603, 0x0) 23:27:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 147.920116][T12379] XFS (loop1): SB sanity check failed [ 147.944902][T12379] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:27:56 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2) [ 148.025576][T12379] XFS (loop1): Unmount and run xfs_repair [ 148.052741][T12379] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 148.060254][T12379] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 148.071056][T12379] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 148.125168][T12379] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 148.142488][T12379] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 148.151414][T12379] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 148.170595][T12379] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 148.200776][T12379] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 148.271716][T12379] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 148.281660][T12379] XFS (loop1): SB validate failed with error -117. [ 148.339240][T12398] XFS (loop0): SB sanity check failed [ 148.354405][T12398] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 148.404634][T12398] XFS (loop0): Unmount and run xfs_repair [ 148.413074][T12398] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 148.420747][T12398] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 148.451880][T12398] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 148.461585][T12398] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 148.485581][T12398] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 148.504370][T12398] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 148.519875][T12398] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 148.529456][T12398] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 148.550076][T12398] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 148.572081][T12398] XFS (loop0): SB validate failed with error -117. 23:27:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:27:57 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:57 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x3) 23:27:57 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:57 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4) [ 148.829387][T12422] XFS (loop5): device supports 512 byte sectors (not 0) [ 148.873362][T12421] XFS (loop3): device supports 512 byte sectors (not 0) 23:27:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:27:57 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:57 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x5) [ 148.974066][T10082] XFS (loop1): SB sanity check failed [ 148.979717][T10082] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 149.058875][T10082] XFS (loop1): Unmount and run xfs_repair [ 149.092496][T10082] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 149.144968][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 149.171175][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 149.183573][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 23:27:57 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:57 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6) [ 149.192994][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 149.202039][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 149.212015][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 149.221421][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 149.230845][T10082] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 149.240372][T12437] XFS (loop1): SB validate failed with error -117. [ 149.463251][T12461] XFS (loop0): SB sanity check failed [ 149.482693][T12461] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 149.538750][T12461] XFS (loop0): Unmount and run xfs_repair [ 149.572652][T12461] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 149.595289][T12461] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 149.606763][T12461] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 149.636074][T12461] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 149.645532][T12461] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 149.654554][T12461] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 149.663693][T12461] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 23:27:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:27:58 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:27:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:27:58 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7) [ 149.720312][T12461] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 149.731861][T12461] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 149.749390][T12461] XFS (loop0): SB validate failed with error -117. 23:27:58 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:58 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x27) [ 149.922125][T12487] XFS (loop5): device supports 512 byte sectors (not 0) [ 149.935736][T12491] XFS (loop3): device supports 512 byte sectors (not 0) 23:27:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:27:58 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 150.156761][ T5] XFS (loop1): SB sanity check failed [ 150.164070][ T5] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:27:58 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2f) [ 150.242613][ T5] XFS (loop1): Unmount and run xfs_repair [ 150.252782][ T5] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 150.260179][ T5] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 23:27:59 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 150.310394][ T5] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 23:27:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 150.359444][ T5] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 150.373058][ T5] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 150.381943][ T5] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 150.401507][ T5] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 150.410780][ T5] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 150.419749][ T5] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 150.428781][T12510] XFS (loop1): SB validate failed with error -117. [ 150.666998][T12533] XFS (loop0): SB sanity check failed [ 150.690341][T12533] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 150.693187][T12536] XFS (loop5): device supports 512 byte sectors (not 0) [ 150.719589][T12533] XFS (loop0): Unmount and run xfs_repair [ 150.759631][T12533] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 150.771886][T12533] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 150.797672][T12533] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 150.826083][T12533] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 150.835892][T12533] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 150.845469][T12533] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 150.854882][T12533] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 150.865843][T12533] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 150.877859][T12533] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 150.887276][T12533] XFS (loop0): SB validate failed with error -117. 23:27:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:27:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:27:59 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:59 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x48) 23:27:59 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:27:59 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4c) [ 151.101656][T12561] XFS (loop3): device supports 512 byte sectors (not 0) 23:27:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:28:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:00 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 151.305136][T12575] XFS (loop1): SB sanity check failed [ 151.312534][T12575] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:00 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x68) [ 151.374939][T12575] XFS (loop1): Unmount and run xfs_repair [ 151.381059][T12575] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 151.431820][T12575] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 23:28:00 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 151.480331][T12575] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 151.509649][T12575] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 151.593012][T12575] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 23:28:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 151.643331][T12590] XFS (loop5): device supports 512 byte sectors (not 0) [ 151.652671][T12575] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 151.685548][T10082] XFS (loop0): SB sanity check failed [ 151.691111][T10082] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 151.702737][T12575] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 151.755557][T12575] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 151.802554][T10082] XFS (loop0): Unmount and run xfs_repair [ 151.808341][T10082] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 151.822274][T12575] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 151.849145][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 151.863047][T12575] XFS (loop1): SB validate failed with error -117. [ 151.908393][T12618] XFS (loop3): device supports 512 byte sectors (not 0) [ 151.918867][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 151.931441][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 151.941209][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 151.951913][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 151.965800][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 151.977893][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 152.019361][T10082] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 152.046309][T12594] XFS (loop0): SB validate failed with error -117. 23:28:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:01 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6c) 23:28:01 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 23:28:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:01 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x74) 23:28:01 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:01 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:01 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7a) [ 152.673306][T12638] XFS (loop5): device supports 512 byte sectors (not 0) [ 152.693103][T10082] XFS (loop1): SB sanity check failed [ 152.698774][T10082] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 152.755682][T12657] XFS (loop3): SB sanity check failed [ 152.762167][T12657] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 152.773177][T10082] XFS (loop1): Unmount and run xfs_repair [ 152.824707][T10082] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 152.882854][T12657] XFS (loop3): Unmount and run xfs_repair [ 152.904455][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 152.924135][T12657] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 152.934795][T12671] XFS (loop0): SB sanity check failed [ 152.940223][T12671] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 152.968380][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 23:28:01 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:01 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xc0) [ 152.977648][T12657] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 153.002728][T12671] XFS (loop0): Unmount and run xfs_repair [ 153.012580][T12657] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 153.021467][T12657] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 153.036513][T12671] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 153.042906][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 153.072989][T12671] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 153.083596][T12657] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 153.086995][T12671] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 153.100921][T12657] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 153.105254][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 153.130764][T12671] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 153.142803][T12657] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 153.152798][T12671] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 153.168813][T12657] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 153.185979][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 153.222615][T12657] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 153.227269][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 153.247877][T12671] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 153.250718][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 153.261366][T12657] XFS (loop3): SB validate failed with error -117. [ 153.266455][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 153.283777][T12671] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 153.292862][T12641] XFS (loop1): SB validate failed with error -117. [ 153.367468][T12671] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 153.412544][T12671] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 153.441083][T12671] XFS (loop0): SB validate failed with error -117. 23:28:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:02 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:02 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x109) 23:28:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 153.775140][T10082] XFS (loop5): SB sanity check failed [ 153.780860][T10082] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 153.804176][T10082] XFS (loop5): Unmount and run xfs_repair [ 153.810163][T10082] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 153.825697][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 153.844386][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 23:28:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:02 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:02 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x300) [ 153.874299][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 23:28:02 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:02 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x346) [ 153.954191][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 153.991162][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 154.029876][T12713] XFS (loop1): SB sanity check failed [ 154.031533][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 154.050042][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 154.052714][T12713] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 154.059276][T10082] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 154.152873][T12702] XFS (loop5): SB validate failed with error -117. [ 154.163507][T12713] XFS (loop1): Unmount and run xfs_repair [ 154.192607][T12713] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 154.203227][T12730] XFS (loop0): SB sanity check failed [ 154.210327][ T5] XFS (loop3): SB sanity check failed [ 154.210546][T12730] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 154.230724][ T5] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 154.252544][T12713] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 154.282676][T12730] XFS (loop0): Unmount and run xfs_repair [ 154.288708][T12730] XFS (loop0): First 128 bytes of corrupted metadata buffer: 23:28:03 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:03 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x480) [ 154.297199][T12713] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 154.318668][ T5] XFS (loop3): Unmount and run xfs_repair [ 154.327387][T12730] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 154.332600][T12713] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 154.336809][ T5] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 154.353896][T12730] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 154.363600][T12730] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 154.373030][ T5] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 154.382049][ T5] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 154.391629][T12730] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 154.401076][ T5] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 154.429753][T12713] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 154.437764][T12730] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 154.452675][ T5] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 154.461953][ T5] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 154.482840][T12713] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 154.517765][T12730] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 154.529673][ T5] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 154.539279][T12713] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 154.606101][T12730] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 154.621678][ T5] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 154.642967][T12730] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 154.654841][T12713] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 154.664394][ T5] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 154.680248][T12730] XFS (loop0): SB validate failed with error -117. [ 154.714900][T12722] XFS (loop3): SB validate failed with error -117. [ 154.716962][T12713] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 154.747020][T12713] XFS (loop1): SB validate failed with error -117. 23:28:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:03 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:03 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x500) 23:28:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:03 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:03 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x600) 23:28:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 155.425315][T12773] XFS (loop3): SB sanity check failed [ 155.458151][T12773] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 155.474525][T12769] XFS (loop5): SB sanity check failed [ 155.489465][T12769] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:04 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:04 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x700) [ 155.550759][T12773] XFS (loop3): Unmount and run xfs_repair [ 155.576807][T12769] XFS (loop5): Unmount and run xfs_repair [ 155.582925][T12773] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 155.591259][ T5] XFS (loop0): SB sanity check failed [ 155.597565][T12769] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 155.605384][ T5] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 155.618973][T12773] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 155.632981][T12769] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 155.646754][T12773] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 155.658144][ T5] XFS (loop0): Unmount and run xfs_repair [ 155.668901][T12769] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 155.679122][T12802] XFS (loop1): SB sanity check failed [ 155.691648][T12802] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 155.705090][ T5] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 155.715054][T12773] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 155.742999][ T5] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 155.752086][T12769] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 155.776116][T12773] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 23:28:04 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x901) [ 155.793340][T12802] XFS (loop1): Unmount and run xfs_repair [ 155.799263][T12769] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 155.805428][ T5] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 155.814241][T12802] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 155.830102][T12773] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 155.874140][ T5] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 155.887993][T12773] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 155.888130][T12802] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 155.927623][ T5] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 155.940480][T12769] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 155.941179][T12773] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 155.997194][T12802] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 156.003413][ T5] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 156.041079][T12802] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 156.062786][T12769] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 156.067074][T12773] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 156.081886][ T5] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 156.092851][T12802] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 156.122614][T12773] XFS (loop3): SB validate failed with error -117. [ 156.135562][ T5] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 156.138511][T12769] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 156.164226][T12802] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 156.178091][ T5] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 156.204930][T12802] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 156.228645][T12781] XFS (loop0): SB validate failed with error -117. [ 156.235653][T12769] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 156.247685][T12802] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 156.274358][T12769] XFS (loop5): SB validate failed with error -117. [ 156.287755][T12802] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 156.305123][T12802] XFS (loop1): SB validate failed with error -117. 23:28:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:05 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:05 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2700) 23:28:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:05 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2f00) 23:28:05 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:05 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4000) [ 156.917921][T12836] XFS (loop3): SB sanity check failed [ 156.933847][ T5] XFS (loop0): SB sanity check failed [ 156.939731][ T5] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 156.989129][T12836] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:05 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 157.058539][ T5] XFS (loop0): Unmount and run xfs_repair [ 157.077338][T12836] XFS (loop3): Unmount and run xfs_repair [ 157.094104][ T5] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 157.102796][T12868] XFS (loop5): SB sanity check failed [ 157.107761][T12836] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 157.117721][T12868] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 157.127328][ T5] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 157.150377][T12836] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 157.162614][T12868] XFS (loop5): Unmount and run xfs_repair [ 157.172800][T12868] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 157.183280][ T5] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 157.193873][T12836] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 23:28:05 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x416d) [ 157.205423][ T5] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 157.216078][T12868] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 157.226359][T12836] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 157.236349][ T5] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 157.248242][T12836] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 157.258932][T12868] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 157.269148][ T5] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 157.279442][T12836] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 157.289446][ T5] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 157.300088][T12868] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 23:28:06 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 157.302809][T12836] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 157.310001][ T5] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 157.328884][T12868] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 157.338786][T12868] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 157.349648][ T5] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 157.359698][T12868] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 157.372901][T12846] XFS (loop1): SB sanity check failed [ 157.375413][T12841] XFS (loop0): SB validate failed with error -117. [ 157.384827][T12846] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 157.406392][T12836] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 157.441901][T12868] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 157.468534][T12836] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 157.484542][T12846] XFS (loop1): Unmount and run xfs_repair [ 157.506268][T12868] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 157.532347][T12846] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 157.548482][T12836] XFS (loop3): SB validate failed with error -117. [ 157.570061][T12868] XFS (loop5): SB validate failed with error -117. [ 157.597706][T12846] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 157.639208][T12846] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 157.659470][T12846] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 157.668735][T12846] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 157.680832][T12846] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 157.690043][T12846] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 157.732614][T12846] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 157.773377][T12846] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 157.818484][T12846] XFS (loop1): SB validate failed with error -117. 23:28:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:06 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4603) 23:28:06 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:06 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4800) 23:28:06 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 158.236652][T12902] XFS (loop0): SB sanity check failed [ 158.283263][T12902] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 158.335922][T12908] XFS (loop5): SB sanity check failed [ 158.366080][T12908] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 158.389117][T12913] XFS (loop3): SB sanity check failed [ 158.398607][T12902] XFS (loop0): Unmount and run xfs_repair [ 158.399692][T12913] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 158.417198][T12902] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 158.458578][T12908] XFS (loop5): Unmount and run xfs_repair [ 158.491948][T12908] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 158.505603][T12902] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 158.528939][T10082] XFS (loop1): SB sanity check failed [ 158.541186][T12908] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 23:28:07 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4c00) 23:28:07 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 158.550830][T10082] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 158.557070][T12902] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 158.566479][T12913] XFS (loop3): Unmount and run xfs_repair [ 158.589749][T12908] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 158.602306][T12902] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 158.619932][T10082] XFS (loop1): Unmount and run xfs_repair [ 158.633936][T12913] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 158.658720][T12908] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 158.660925][T10082] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 158.679701][T12902] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 158.689297][T12913] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 158.702537][T12908] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 158.736543][T12902] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 158.742736][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 158.756968][T12913] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 158.766174][T12908] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 158.775300][T12902] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 23:28:07 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6800) 23:28:07 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 158.784579][T12913] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 158.794001][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 158.805341][T12908] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 158.833366][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 158.842272][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 158.851541][T12902] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 158.861123][T12913] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 158.872002][T12908] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 158.886410][T12902] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 158.896372][T12913] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 158.905678][T12908] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 158.916343][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 158.926409][T12902] XFS (loop0): SB validate failed with error -117. [ 158.933522][T12913] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 158.943230][T12908] XFS (loop5): SB validate failed with error -117. [ 158.952651][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 158.973450][T12913] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 159.018060][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 159.041174][T12913] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 159.075726][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 159.103128][T12913] XFS (loop3): SB validate failed with error -117. [ 159.137161][T12933] XFS (loop1): SB validate failed with error -117. 23:28:08 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:08 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6c00) 23:28:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:08 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:08 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6d41) 23:28:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 159.669231][T12969] XFS (loop5): SB sanity check failed [ 159.685190][T12969] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 159.718461][T12977] XFS (loop0): SB sanity check failed [ 159.720980][T12969] XFS (loop5): Unmount and run xfs_repair [ 159.742548][T12977] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 159.755569][T12969] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 159.765186][T12969] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 159.827235][T12977] XFS (loop0): Unmount and run xfs_repair [ 159.866778][T12969] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 159.906270][T12977] XFS (loop0): First 128 bytes of corrupted metadata buffer: 23:28:08 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 159.932918][T12977] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 159.942776][T12969] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 23:28:08 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7400) [ 159.974873][T10082] XFS (loop3): SB sanity check failed [ 159.980566][T10082] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 160.005952][T12977] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 160.018420][ T12] XFS (loop1): SB sanity check failed [ 160.026751][T12969] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 160.027061][ T12] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 160.065402][T10082] XFS (loop3): Unmount and run xfs_repair [ 160.073012][T12969] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 160.088765][T12977] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 160.109635][T10082] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 160.134408][T12969] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 160.150385][T12977] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 160.160682][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 160.168270][ T12] XFS (loop1): Unmount and run xfs_repair [ 160.192572][T12969] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 160.224873][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 160.228791][ T12] XFS (loop1): First 128 bytes of corrupted metadata buffer: 23:28:08 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:08 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7a00) [ 160.235124][T12977] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 160.259979][T12969] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 160.269786][T12977] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 160.284571][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 160.304965][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 160.320728][T12977] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 160.344215][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 160.355762][T12969] XFS (loop5): SB validate failed with error -117. [ 160.361873][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 160.401577][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 160.441383][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 23:28:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x8004) [ 160.449432][T12977] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 160.476918][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 160.486247][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 160.516848][T12977] XFS (loop0): SB validate failed with error -117. [ 160.534472][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 160.546002][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 160.573363][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 160.586300][T10082] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 160.626158][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 160.640053][T12983] XFS (loop3): SB validate failed with error -117. [ 160.674858][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 160.699027][T12994] XFS (loop1): SB validate failed with error -117. 23:28:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xc000) 23:28:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xff00) 23:28:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 161.273688][T13042] XFS (loop5): SB sanity check failed [ 161.305409][T13042] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:10 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x1000000) [ 161.378629][T13042] XFS (loop5): Unmount and run xfs_repair [ 161.389889][T10082] XFS (loop1): SB sanity check failed [ 161.392088][T13042] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 161.410894][T13042] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 161.421479][T13042] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 161.440051][T13075] XFS (loop3): SB sanity check failed [ 161.446164][T10082] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 161.447070][T13075] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 161.526470][T13042] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 161.532117][T10082] XFS (loop1): Unmount and run xfs_repair [ 161.557559][T10082] XFS (loop1): First 128 bytes of corrupted metadata buffer: 23:28:10 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 161.571465][T13042] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 161.589851][T13075] XFS (loop3): Unmount and run xfs_repair [ 161.610556][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 161.626685][T13075] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 161.637928][T13042] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 161.642604][T13075] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 161.647640][T13042] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 161.665632][T13042] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 161.675526][T13042] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 161.696928][T13042] XFS (loop5): SB validate failed with error -117. [ 161.709096][T13075] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 161.718780][T13075] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 161.724620][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 161.728913][T13075] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 161.748024][T13075] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 161.757723][T13075] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 161.808648][T13075] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 161.820772][T13075] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 161.846005][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 161.852272][T13075] XFS (loop3): SB validate failed with error -117. [ 161.913193][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 161.945669][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 161.980778][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 161.996320][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 162.009107][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 162.019606][T13060] XFS (loop1): SB validate failed with error -117. [ 162.030505][T10082] XFS (loop0): SB sanity check failed [ 162.060278][T10082] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 162.079767][T10082] XFS (loop0): Unmount and run xfs_repair [ 162.087607][T10082] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 162.101236][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 162.122674][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 162.131602][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 162.149344][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 162.159631][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 162.171638][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 162.181579][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 162.195478][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 162.206131][T13065] XFS (loop0): SB validate failed with error -117. 23:28:11 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:11 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2000000) 23:28:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:11 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x3000000) 23:28:11 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 162.774440][ T12] XFS (loop1): SB sanity check failed [ 162.780502][ T12] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 162.792746][T10082] XFS (loop3): SB sanity check failed [ 162.798539][T10082] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 162.818056][T13116] XFS (loop5): SB sanity check failed [ 162.841617][T13116] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 162.841816][ T12] XFS (loop1): Unmount and run xfs_repair 23:28:11 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4000000) [ 162.915964][T10082] XFS (loop3): Unmount and run xfs_repair [ 162.931386][T13116] XFS (loop5): Unmount and run xfs_repair [ 162.952788][ T12] XFS (loop1): First 128 bytes of corrupted metadata buffer: 23:28:11 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 162.954156][T10082] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 162.970325][T13116] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 162.984212][T13116] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 162.993657][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 163.003414][T13116] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 163.012732][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 163.022582][T13116] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 163.031583][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 163.031869][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 163.049902][T13116] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 163.059314][T13116] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 163.068662][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 163.078710][T13116] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 163.088573][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 163.097976][T13116] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 163.107431][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 163.116867][T13116] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 163.119275][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 163.126097][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 163.144085][T13116] XFS (loop5): SB validate failed with error -117. [ 163.153562][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 163.163152][T13115] XFS (loop3): SB validate failed with error -117. 23:28:11 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x5000000) [ 163.251542][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 23:28:12 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 163.305932][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 163.361655][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 163.418893][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 23:28:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6000000) 23:28:12 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 163.478260][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 163.514315][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 163.535318][T13112] XFS (loop1): SB validate failed with error -117. [ 163.548441][ T12] XFS (loop0): SB sanity check failed [ 163.561149][ T12] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 163.573569][ T12] XFS (loop0): Unmount and run xfs_repair [ 163.579294][ T12] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 163.607157][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 23:28:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 163.661826][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 163.692837][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 163.719705][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 163.741523][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 163.750531][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 163.759612][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 163.768757][ T12] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 163.787543][T13144] XFS (loop0): SB validate failed with error -117. [ 163.909505][T13174] XFS (loop3): SB sanity check failed [ 163.922159][T13174] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7000000) 23:28:12 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 163.950263][T13174] XFS (loop3): Unmount and run xfs_repair [ 163.958933][T13174] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 164.008196][T13174] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 164.051332][T13174] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 164.058718][T13181] XFS (loop5): SB sanity check failed [ 164.071862][T13181] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 164.084402][T13174] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 164.112081][T13174] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 164.121658][T13181] XFS (loop5): Unmount and run xfs_repair [ 164.128847][T13181] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 164.136702][T13174] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 164.191475][T13181] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 164.214440][T13174] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 164.229186][T13181] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 23:28:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 23:28:12 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x9010000) [ 164.247948][T13174] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 23:28:13 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:13 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x27000000) [ 164.291764][T13181] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 164.325281][T13174] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 164.375665][T13181] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 164.393284][T13174] XFS (loop3): SB validate failed with error -117. [ 164.419058][T13199] XFS (loop1): SB sanity check failed [ 164.459100][T13199] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 164.492796][T13181] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 164.547486][T13181] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 164.584394][T13199] XFS (loop1): Unmount and run xfs_repair 23:28:13 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:13 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2f000000) [ 164.633894][T13181] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 164.665989][T10082] XFS (loop0): SB sanity check failed [ 164.671527][T10082] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 164.712825][T13199] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 164.722879][T13181] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 164.731670][T13199] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 164.780192][T10082] XFS (loop0): Unmount and run xfs_repair [ 164.789848][T13199] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 164.799490][T10082] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 164.814381][T13181] XFS (loop5): SB validate failed with error -117. [ 164.833314][T13199] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 164.844158][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 164.867019][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 164.877772][T13199] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 164.897080][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 164.910737][T13199] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 164.922772][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 164.939375][T13199] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 164.948868][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 164.958610][T13199] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 164.967930][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 164.978104][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 164.987651][T13199] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 164.997580][T10082] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 165.006866][T13199] XFS (loop1): SB validate failed with error -117. [ 165.013989][T13216] XFS (loop0): SB validate failed with error -117. 23:28:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 23:28:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:28:14 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x40000000) 23:28:14 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:14 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:14 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x46030000) [ 165.530337][T10082] XFS (loop3): SB sanity check failed [ 165.544601][T10082] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:14 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 165.634275][T10082] XFS (loop3): Unmount and run xfs_repair [ 165.635572][T13269] XFS (loop1): device supports 512 byte sectors (not 0) [ 165.646706][T10082] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 165.697447][ T12] XFS (loop5): SB sanity check failed [ 165.700566][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 165.705687][ T12] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 165.713581][T13257] XFS (loop0): SB sanity check failed [ 165.770768][T13257] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 165.802173][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 23:28:14 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x48000000) [ 165.827785][ T12] XFS (loop5): Unmount and run xfs_repair [ 165.845006][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 165.854454][T13257] XFS (loop0): Unmount and run xfs_repair [ 165.859014][ T12] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 165.895670][T13257] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 165.915440][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 165.918157][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 23:28:14 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 165.942619][T13257] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 165.970222][T13257] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 165.976938][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 23:28:14 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4c000000) [ 166.027040][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 166.042753][T13257] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 166.066418][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 166.084016][T13257] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 166.089734][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 166.098198][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 166.120383][T13257] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 166.124860][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 166.136079][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 166.152000][T13257] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 166.171593][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 166.181752][T13257] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 166.194473][T13242] XFS (loop3): SB validate failed with error -117. [ 166.199354][T13257] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 166.204655][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 166.210559][T13257] XFS (loop0): SB validate failed with error -117. [ 166.237453][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 166.246652][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 166.256147][T13265] XFS (loop5): SB validate failed with error -117. 23:28:15 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:15 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:15 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x68000000) 23:28:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:15 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:15 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:15 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6c000000) [ 166.775165][T10082] XFS (loop1): SB sanity check failed [ 166.781979][T10082] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 166.875627][T10082] XFS (loop1): Unmount and run xfs_repair [ 166.905724][T10082] XFS (loop1): First 128 bytes of corrupted metadata buffer: 23:28:15 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:15 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6d410000) [ 166.944261][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 166.957728][T13319] XFS (loop5): SB sanity check failed [ 166.964605][T13319] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 167.017787][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 167.044201][T13319] XFS (loop5): Unmount and run xfs_repair [ 167.084418][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 167.095080][T13342] XFS (loop0): SB sanity check failed [ 167.108838][T13319] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 167.119020][T13342] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 167.150035][T13319] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 167.162540][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 167.181454][T13342] XFS (loop0): Unmount and run xfs_repair [ 167.191759][T13319] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 167.207481][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 167.228365][T13342] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 167.240129][T13319] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 23:28:15 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 167.251804][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 167.282029][T13342] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 167.292529][T13319] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 23:28:16 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x74000000) [ 167.298462][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 167.312991][T13342] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 167.322182][T10082] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 167.357955][T13342] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 167.385385][T13312] XFS (loop1): SB validate failed with error -117. [ 167.396781][T10082] XFS (loop3): SB sanity check failed [ 167.407420][T13319] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 167.413010][T13342] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 167.434921][T10082] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 167.477646][T13342] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 167.497349][T13319] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 167.522782][T10082] XFS (loop3): Unmount and run xfs_repair [ 167.543196][T13319] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 167.561821][T10082] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 167.580933][T13342] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 167.610862][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 167.622324][T13319] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 167.651295][T13342] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 167.671803][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 167.681938][T13319] XFS (loop5): SB validate failed with error -117. [ 167.693727][T13342] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 167.705503][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 167.724887][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 167.755590][T13342] XFS (loop0): SB validate failed with error -117. [ 167.772718][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 167.809112][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 167.830355][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 167.858641][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 167.890887][T13323] XFS (loop3): SB validate failed with error -117. 23:28:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:16 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:16 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7a000000) 23:28:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:16 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x80040000) 23:28:16 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 168.234170][ T12] XFS (loop1): SB sanity check failed [ 168.239835][ T12] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 168.329824][ T12] XFS (loop1): Unmount and run xfs_repair [ 168.358654][ T12] XFS (loop1): First 128 bytes of corrupted metadata buffer: 23:28:17 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xc0000000) [ 168.396955][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 168.426973][T10082] XFS (loop5): SB sanity check failed 23:28:17 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 168.441409][T10082] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 168.452262][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 168.515580][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 168.522588][T10082] XFS (loop5): Unmount and run xfs_repair [ 168.541651][T10082] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 168.572308][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 168.582652][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 168.623017][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 168.640275][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 23:28:17 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:17 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xf6ffffff) [ 168.667238][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 168.679569][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 168.692686][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 168.696928][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 168.757677][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 168.776199][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 168.803977][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 168.826776][ T12] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 168.866761][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 168.886342][T13379] XFS (loop1): SB validate failed with error -117. [ 168.911363][T13393] XFS (loop5): SB validate failed with error -117. [ 168.917541][T13399] XFS (loop0): SB sanity check failed [ 168.925308][T13415] XFS (loop3): SB sanity check failed [ 168.931077][T13415] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 168.949328][T13399] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 168.979911][T13415] XFS (loop3): Unmount and run xfs_repair [ 168.988095][T13399] XFS (loop0): Unmount and run xfs_repair [ 168.998661][T13415] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 169.028144][T13399] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 169.046194][T13415] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 169.059075][T13399] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 169.070960][T13415] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 169.094638][T13399] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 169.107929][T13415] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 169.158070][T13415] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 169.172433][T13399] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 169.199022][T13415] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 23:28:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 23:28:17 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:17 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfcfdffff) [ 169.215368][T13415] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 169.241745][T13399] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 169.243377][T13415] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 169.319993][T13399] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 169.332583][T13415] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ 23:28:18 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 169.362603][T13415] XFS (loop3): SB validate failed with error -117. [ 169.385591][T13399] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 169.436017][T13399] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 169.482761][T13399] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 169.560119][T13399] XFS (loop0): SB validate failed with error -117. [ 169.662693][T10082] XFS (loop5): SB sanity check failed [ 169.668229][T10082] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:18 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfeffffff) 23:28:18 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:18 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 169.734403][T10082] XFS (loop5): Unmount and run xfs_repair [ 169.740621][T10082] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 169.818755][T10082] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 169.847979][T10082] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 169.878306][T10082] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 169.908397][T10082] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 23:28:18 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 23:28:18 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xff000000) 23:28:18 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:18 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 169.943672][T10082] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 169.979861][T10082] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 170.052490][T10082] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 170.061396][T10082] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 170.142637][T13448] XFS (loop5): SB validate failed with error -117. [ 170.278541][T13479] XFS (loop3): device supports 512 byte sectors (not 0) 23:28:19 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfffffdfc) 23:28:19 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:19 executing program 1: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 23:28:19 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:19 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:28:19 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:19 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfffffff6) 23:28:19 executing program 1: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 23:28:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:28:19 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 170.816747][T13513] XFS (loop5): Invalid superblock magic number 23:28:19 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:19 executing program 1: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 23:28:19 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfffffffe) [ 170.959899][T13530] XFS (loop3): Invalid superblock magic number 23:28:19 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x1000000000000) 23:28:19 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:19 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:28:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:20 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x100000000000000) 23:28:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:28:20 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:20 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x200000000000000) [ 171.676089][T13569] XFS (loop1): Invalid superblock magic number [ 171.710276][T13575] XFS (loop5): Mounting V4 Filesystem [ 171.770169][T13575] XFS (loop5): empty log check failed [ 171.812561][T13575] XFS (loop5): log mount/recovery failed: error -5 23:28:20 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 171.856027][T13596] XFS (loop3): Invalid superblock magic number [ 171.932929][T13575] XFS (loop5): log mount failed 23:28:20 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x300000000000000) 23:28:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:20 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:20 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x400000000000000) 23:28:21 executing program 5 (fault-call:0 fault-nth:0): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:21 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20001, 0x0) 23:28:21 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x500000000000000) 23:28:21 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 172.545100][T13634] XFS (loop1): Mounting V4 Filesystem [ 172.621621][T13634] XFS (loop1): empty log check failed [ 172.637363][T13634] XFS (loop1): log mount/recovery failed: error -5 [ 172.661717][T13648] XFS (loop0): Invalid superblock magic number [ 172.671381][T13668] FAULT_INJECTION: forcing a failure. [ 172.671381][T13668] name failslab, interval 1, probability 0, space 0, times 0 23:28:21 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 172.738702][T13651] XFS (loop3): Mounting V4 Filesystem [ 172.763074][T13634] XFS (loop1): log mount failed 23:28:21 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x600000000000000) [ 172.804205][T13651] XFS (loop3): empty log check failed [ 172.817224][T13651] XFS (loop3): log mount/recovery failed: error -5 [ 172.842637][T13668] CPU: 1 PID: 13668 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 172.850317][T13668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.860416][T13668] Call Trace: [ 172.863735][T13668] dump_stack+0x172/0x1f0 [ 172.868101][T13668] should_fail.cold+0xa/0x15 [ 172.872734][T13668] ? fault_create_debugfs_attr+0x180/0x180 [ 172.878565][T13668] ? ___might_sleep+0x163/0x280 [ 172.883607][T13668] __should_failslab+0x121/0x190 [ 172.888569][T13668] should_failslab+0x9/0x14 [ 172.893094][T13668] kmem_cache_alloc+0x2aa/0x710 [ 172.897967][T13668] ? __kasan_check_write+0x14/0x20 [ 172.903100][T13668] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 172.908667][T13668] getname_flags+0xd6/0x5b0 [ 172.913195][T13668] getname+0x1a/0x20 [ 172.917108][T13668] do_sys_open+0x2c9/0x5d0 [ 172.921547][T13668] ? filp_open+0x80/0x80 [ 172.925905][T13668] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.931376][T13668] ? do_syscall_64+0x26/0x6a0 [ 172.936206][T13668] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.942297][T13668] ? do_syscall_64+0x26/0x6a0 [ 172.946991][T13668] __x64_sys_open+0x7e/0xc0 23:28:21 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 172.951506][T13668] do_syscall_64+0xfd/0x6a0 [ 172.956029][T13668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.961924][T13668] RIP: 0033:0x413701 [ 172.965825][T13668] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 172.985700][T13668] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 172.985716][T13668] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 172.985724][T13668] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 172.985731][T13668] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 172.985739][T13668] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 172.985746][T13668] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:21 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 173.088420][T13651] XFS (loop3): log mount failed 23:28:22 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:22 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x700000000000000) 23:28:22 executing program 5 (fault-call:0 fault-nth:1): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:22 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 173.434470][T13704] FAULT_INJECTION: forcing a failure. [ 173.434470][T13704] name failslab, interval 1, probability 0, space 0, times 0 [ 173.448678][T13704] CPU: 0 PID: 13704 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 173.456337][T13704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.466489][T13704] Call Trace: [ 173.469803][T13704] dump_stack+0x172/0x1f0 [ 173.474160][T13704] should_fail.cold+0xa/0x15 [ 173.478780][T13704] ? fault_create_debugfs_attr+0x180/0x180 23:28:22 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:22 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x901000000000000) 23:28:22 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 173.484604][T13704] ? ___might_sleep+0x163/0x280 [ 173.489467][T13704] __should_failslab+0x121/0x190 [ 173.494431][T13704] should_failslab+0x9/0x14 [ 173.498953][T13704] kmem_cache_alloc+0x2aa/0x710 [ 173.503821][T13704] ? stack_trace_save+0xac/0xe0 [ 173.508689][T13704] ? stack_trace_consume_entry+0x190/0x190 [ 173.514518][T13704] __alloc_file+0x27/0x300 [ 173.518979][T13704] alloc_empty_file+0x72/0x170 [ 173.523762][T13704] path_openat+0xef/0x46d0 [ 173.528279][T13704] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 173.534101][T13704] ? kasan_slab_alloc+0xf/0x20 [ 173.538874][T13704] ? kmem_cache_alloc+0x121/0x710 [ 173.543918][T13704] ? getname_flags+0xd6/0x5b0 [ 173.543930][T13704] ? getname+0x1a/0x20 [ 173.543944][T13704] ? do_sys_open+0x2c9/0x5d0 [ 173.543969][T13704] ? __kasan_check_read+0x11/0x20 [ 173.543983][T13704] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 173.544009][T13704] ? fbcon_scroll+0x1750/0x35b0 [ 173.572550][T13704] ? __alloc_fd+0x487/0x620 [ 173.577104][T13704] do_filp_open+0x1a1/0x280 23:28:22 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2700000000000000) [ 173.581630][T13704] ? may_open_dev+0x100/0x100 [ 173.586335][T13704] ? lock_downgrade+0x920/0x920 [ 173.591200][T13704] ? rwlock_bug.part.0+0x90/0x90 [ 173.596226][T13704] ? __kasan_check_read+0x11/0x20 [ 173.601269][T13704] ? do_raw_spin_unlock+0x57/0x270 [ 173.606397][T13704] ? _raw_spin_unlock+0x2d/0x50 [ 173.611263][T13704] ? __alloc_fd+0x487/0x620 [ 173.615813][T13704] do_sys_open+0x3fe/0x5d0 [ 173.620338][T13704] ? filp_open+0x80/0x80 [ 173.624604][T13704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 173.630100][T13704] ? do_syscall_64+0x26/0x6a0 23:28:22 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 173.634863][T13704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.640942][T13704] ? do_syscall_64+0x26/0x6a0 [ 173.645759][T13704] __x64_sys_open+0x7e/0xc0 [ 173.650281][T13704] do_syscall_64+0xfd/0x6a0 [ 173.654793][T13704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.660691][T13704] RIP: 0033:0x413701 [ 173.664579][T13704] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 173.684192][T13704] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 173.692616][T13704] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 173.700595][T13704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 173.708644][T13704] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 173.716605][T13704] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 173.724592][T13704] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:22 executing program 5 (fault-call:0 fault-nth:2): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 173.908121][T13721] FAULT_INJECTION: forcing a failure. [ 173.908121][T13721] name failslab, interval 1, probability 0, space 0, times 0 [ 173.944598][T13724] FAULT_INJECTION: forcing a failure. [ 173.944598][T13724] name failslab, interval 1, probability 0, space 0, times 0 23:28:22 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 173.974779][T13699] XFS (loop0): Invalid superblock magic number [ 174.002574][T13724] CPU: 1 PID: 13724 Comm: syz-executor.3 Not tainted 5.2.0+ #56 [ 174.010260][T13724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.020333][T13724] Call Trace: [ 174.023646][T13724] dump_stack+0x172/0x1f0 [ 174.028090][T13724] should_fail.cold+0xa/0x15 [ 174.032702][T13724] ? fault_create_debugfs_attr+0x180/0x180 [ 174.038531][T13724] ? ___might_sleep+0x163/0x280 [ 174.043403][T13724] __should_failslab+0x121/0x190 [ 174.048359][T13724] should_failslab+0x9/0x14 [ 174.052886][T13724] __kmalloc+0x2e0/0x780 [ 174.057173][T13724] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.063427][T13724] ? fput_many+0x12c/0x1a0 [ 174.067860][T13724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 174.074118][T13724] ? strnlen_user+0x1ed/0x280 [ 174.078811][T13724] ? __x64_sys_memfd_create+0x13c/0x470 [ 174.084370][T13724] __x64_sys_memfd_create+0x13c/0x470 [ 174.089759][T13724] ? memfd_fcntl+0x1580/0x1580 [ 174.094541][T13724] ? do_syscall_64+0x26/0x6a0 [ 174.099243][T13724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 174.104555][T13724] ? trace_hardirqs_on+0x67/0x240 [ 174.109601][T13724] do_syscall_64+0xfd/0x6a0 [ 174.111679][T13728] FAULT_INJECTION: forcing a failure. [ 174.111679][T13728] name failslab, interval 1, probability 0, space 0, times 0 [ 174.114114][T13724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.114127][T13724] RIP: 0033:0x459819 [ 174.114144][T13724] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.114152][T13724] RSP: 002b:00007f773470ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 174.114165][T13724] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 [ 174.114173][T13724] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 174.114182][T13724] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 174.114190][T13724] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f773470f6d4 [ 174.114199][T13724] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 [ 174.146006][T13721] CPU: 0 PID: 13721 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 174.196760][T13721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.196767][T13721] Call Trace: [ 174.196790][T13721] dump_stack+0x172/0x1f0 [ 174.196818][T13721] should_fail.cold+0xa/0x15 [ 174.230870][T13721] ? fault_create_debugfs_attr+0x180/0x180 [ 174.230896][T13721] ? ___might_sleep+0x163/0x280 [ 174.230919][T13721] __should_failslab+0x121/0x190 [ 174.246148][T13721] should_failslab+0x9/0x14 [ 174.255584][T13721] kmem_cache_alloc+0x2aa/0x710 [ 174.260451][T13721] ? stack_trace_save+0xac/0xe0 [ 174.265319][T13721] ? stack_trace_consume_entry+0x190/0x190 [ 174.271138][T13721] __alloc_file+0x27/0x300 [ 174.275571][T13721] alloc_empty_file+0x72/0x170 [ 174.280376][T13721] path_openat+0xef/0x46d0 [ 174.284806][T13721] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 174.290623][T13721] ? kasan_slab_alloc+0xf/0x20 [ 174.295403][T13721] ? kmem_cache_alloc+0x121/0x710 [ 174.300736][T13721] ? getname_flags+0xd6/0x5b0 [ 174.305430][T13721] ? getname+0x1a/0x20 [ 174.309504][T13721] ? do_sys_open+0x2c9/0x5d0 [ 174.314110][T13721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.320360][T13721] ? __kasan_check_read+0x11/0x20 [ 174.325392][T13721] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 174.330783][T13721] ? __alloc_fd+0x487/0x620 [ 174.335296][T13721] do_filp_open+0x1a1/0x280 [ 174.339805][T13721] ? may_open_dev+0x100/0x100 [ 174.344493][T13721] ? lock_downgrade+0x920/0x920 [ 174.349473][T13721] ? rwlock_bug.part.0+0x90/0x90 [ 174.354424][T13721] ? __kasan_check_read+0x11/0x20 [ 174.359452][T13721] ? do_raw_spin_unlock+0x57/0x270 [ 174.364572][T13721] ? _raw_spin_unlock+0x2d/0x50 [ 174.369442][T13721] ? __alloc_fd+0x487/0x620 [ 174.373963][T13721] do_sys_open+0x3fe/0x5d0 [ 174.378400][T13721] ? filp_open+0x80/0x80 [ 174.382650][T13721] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.388120][T13721] ? do_syscall_64+0x26/0x6a0 [ 174.392800][T13721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.398868][T13721] ? do_syscall_64+0x26/0x6a0 [ 174.403561][T13721] __x64_sys_open+0x7e/0xc0 [ 174.408086][T13721] do_syscall_64+0xfd/0x6a0 [ 174.412704][T13721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.418595][T13721] RIP: 0033:0x413701 [ 174.422495][T13721] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 174.442287][T13721] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 174.450708][T13721] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 174.458682][T13721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 174.466654][T13721] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 174.474638][T13721] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 174.482613][T13721] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 174.490616][T13728] CPU: 1 PID: 13728 Comm: syz-executor.1 Not tainted 5.2.0+ #56 [ 174.498347][T13728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.508410][T13728] Call Trace: [ 174.511712][T13728] dump_stack+0x172/0x1f0 [ 174.516051][T13728] should_fail.cold+0xa/0x15 [ 174.516071][T13728] ? fault_create_debugfs_attr+0x180/0x180 [ 174.516092][T13728] ? ___might_sleep+0x163/0x280 [ 174.516111][T13728] __should_failslab+0x121/0x190 [ 174.516129][T13728] should_failslab+0x9/0x14 [ 174.516144][T13728] __kmalloc+0x2e0/0x780 [ 174.516162][T13728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.516177][T13728] ? fput_many+0x12c/0x1a0 [ 174.516194][T13728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 174.516206][T13728] ? strnlen_user+0x1ed/0x280 [ 174.516221][T13728] ? __x64_sys_memfd_create+0x13c/0x470 [ 174.516241][T13728] __x64_sys_memfd_create+0x13c/0x470 [ 174.516267][T13728] ? memfd_fcntl+0x1580/0x1580 [ 174.516284][T13728] ? do_syscall_64+0x26/0x6a0 [ 174.516302][T13728] ? lockdep_hardirqs_on+0x418/0x5d0 [ 174.516319][T13728] ? trace_hardirqs_on+0x67/0x240 [ 174.516340][T13728] do_syscall_64+0xfd/0x6a0 [ 174.516359][T13728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.516371][T13728] RIP: 0033:0x459819 [ 174.516388][T13728] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.516403][T13728] RSP: 002b:00007fd8cccada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 174.639912][T13728] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 [ 174.647899][T13728] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 174.655886][T13728] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 174.663870][T13728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8cccae6d4 [ 174.671882][T13728] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 23:28:23 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:23 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:23 executing program 5 (fault-call:0 fault-nth:3): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 174.751294][T13738] FAULT_INJECTION: forcing a failure. [ 174.751294][T13738] name failslab, interval 1, probability 0, space 0, times 0 [ 174.835209][T13738] CPU: 1 PID: 13738 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 174.842890][T13738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.842898][T13738] Call Trace: [ 174.842924][T13738] dump_stack+0x172/0x1f0 [ 174.842951][T13738] should_fail.cold+0xa/0x15 [ 174.842976][T13738] ? fault_create_debugfs_attr+0x180/0x180 [ 174.843005][T13738] ? ___might_sleep+0x163/0x280 [ 174.853778][T13743] FAULT_INJECTION: forcing a failure. [ 174.853778][T13743] name failslab, interval 1, probability 0, space 0, times 0 [ 174.856473][T13738] __should_failslab+0x121/0x190 [ 174.856493][T13738] should_failslab+0x9/0x14 [ 174.856517][T13738] kmem_cache_alloc+0x2aa/0x710 [ 174.876142][T13738] ? rcu_read_lock_sched_held+0x110/0x130 [ 174.876162][T13738] ? kmem_cache_alloc+0x364/0x710 [ 174.876184][T13738] security_file_alloc+0x39/0x170 [ 174.918769][T13738] __alloc_file+0xac/0x300 [ 174.923204][T13738] alloc_empty_file+0x72/0x170 [ 174.927996][T13738] path_openat+0xef/0x46d0 [ 174.932419][T13738] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 174.938240][T13738] ? kasan_slab_alloc+0xf/0x20 [ 174.943027][T13738] ? kmem_cache_alloc+0x121/0x710 [ 174.948059][T13738] ? getname_flags+0xd6/0x5b0 [ 174.952744][T13738] ? getname+0x1a/0x20 [ 174.956816][T13738] ? do_sys_open+0x2c9/0x5d0 [ 174.961422][T13738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.967674][T13738] ? __kasan_check_read+0x11/0x20 [ 174.972718][T13738] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 174.978108][T13738] ? __alloc_fd+0x487/0x620 [ 174.982636][T13738] do_filp_open+0x1a1/0x280 [ 174.987159][T13738] ? may_open_dev+0x100/0x100 [ 174.991858][T13738] ? lock_downgrade+0x920/0x920 [ 174.996723][T13738] ? rwlock_bug.part.0+0x90/0x90 [ 175.001680][T13738] ? __kasan_check_read+0x11/0x20 [ 175.006715][T13738] ? do_raw_spin_unlock+0x57/0x270 [ 175.011844][T13738] ? _raw_spin_unlock+0x2d/0x50 [ 175.016709][T13738] ? __alloc_fd+0x487/0x620 [ 175.021235][T13738] do_sys_open+0x3fe/0x5d0 [ 175.025669][T13738] ? filp_open+0x80/0x80 [ 175.029920][T13738] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 175.035388][T13738] ? do_syscall_64+0x26/0x6a0 [ 175.040079][T13738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.046173][T13738] ? do_syscall_64+0x26/0x6a0 [ 175.050874][T13738] __x64_sys_open+0x7e/0xc0 [ 175.055395][T13738] do_syscall_64+0xfd/0x6a0 [ 175.059912][T13738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.065814][T13738] RIP: 0033:0x413701 [ 175.070732][T13738] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 175.090335][T13738] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 175.098757][T13738] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 175.106750][T13738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 175.114825][T13738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 175.122810][T13738] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 175.130833][T13738] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 175.138841][T13743] CPU: 0 PID: 13743 Comm: syz-executor.1 Not tainted 5.2.0+ #56 [ 175.146485][T13743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.156546][T13743] Call Trace: [ 175.159855][T13743] dump_stack+0x172/0x1f0 [ 175.164209][T13743] should_fail.cold+0xa/0x15 [ 175.168816][T13743] ? fault_create_debugfs_attr+0x180/0x180 [ 175.174637][T13743] ? ___might_sleep+0x163/0x280 [ 175.180167][T13743] __should_failslab+0x121/0x190 [ 175.185125][T13743] ? shmem_destroy_inode+0x80/0x80 [ 175.190240][T13743] should_failslab+0x9/0x14 [ 175.194732][T13743] kmem_cache_alloc+0x2aa/0x710 [ 175.199577][T13743] ? __alloc_fd+0x487/0x620 [ 175.204067][T13743] ? shmem_destroy_inode+0x80/0x80 [ 175.209174][T13743] shmem_alloc_inode+0x1c/0x50 [ 175.213966][T13743] alloc_inode+0x68/0x1e0 [ 175.218294][T13743] new_inode_pseudo+0x19/0xf0 [ 175.223078][T13743] new_inode+0x1f/0x40 [ 175.227262][T13743] shmem_get_inode+0x84/0x7e0 [ 175.231951][T13743] __shmem_file_setup.part.0+0x7e/0x2b0 [ 175.237514][T13743] shmem_file_setup+0x66/0x90 [ 175.242184][T13743] __x64_sys_memfd_create+0x2a2/0x470 [ 175.247574][T13743] ? memfd_fcntl+0x1580/0x1580 [ 175.252331][T13743] ? do_syscall_64+0x26/0x6a0 [ 175.257018][T13743] ? lockdep_hardirqs_on+0x418/0x5d0 [ 175.262305][T13743] ? trace_hardirqs_on+0x67/0x240 [ 175.267318][T13743] do_syscall_64+0xfd/0x6a0 [ 175.272093][T13743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.277971][T13743] RIP: 0033:0x459819 [ 175.281869][T13743] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.301461][T13743] RSP: 002b:00007fd8cccada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 175.309874][T13743] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 [ 175.317846][T13743] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 175.325810][T13743] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 175.333781][T13743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8cccae6d4 [ 175.341739][T13743] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 23:28:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 23:28:24 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:24 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x2f00000000000000) 23:28:24 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:24 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:24 executing program 5 (fault-call:0 fault-nth:4): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 175.494395][T13754] FAULT_INJECTION: forcing a failure. [ 175.494395][T13754] name failslab, interval 1, probability 0, space 0, times 0 [ 175.497548][T13755] FAULT_INJECTION: forcing a failure. [ 175.497548][T13755] name failslab, interval 1, probability 0, space 0, times 0 [ 175.521477][T13756] FAULT_INJECTION: forcing a failure. [ 175.521477][T13756] name failslab, interval 1, probability 0, space 0, times 0 [ 175.528354][T13754] CPU: 1 PID: 13754 Comm: syz-executor.1 Not tainted 5.2.0+ #56 [ 175.541745][T13754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.551894][T13754] Call Trace: [ 175.555201][T13754] dump_stack+0x172/0x1f0 [ 175.559553][T13754] should_fail.cold+0xa/0x15 [ 175.564248][T13754] ? fault_create_debugfs_attr+0x180/0x180 [ 175.570086][T13754] ? ___might_sleep+0x163/0x280 [ 175.574956][T13754] __should_failslab+0x121/0x190 [ 175.579913][T13754] should_failslab+0x9/0x14 [ 175.584427][T13754] kmem_cache_alloc+0x2aa/0x710 [ 175.589289][T13754] ? __put_user_ns+0x70/0x70 [ 175.593897][T13754] ? rcu_read_lock_sched_held+0x110/0x130 [ 175.599649][T13754] security_inode_alloc+0x39/0x160 [ 175.604782][T13754] inode_init_always+0x56e/0xb50 [ 175.609744][T13754] alloc_inode+0x89/0x1e0 [ 175.614177][T13754] new_inode_pseudo+0x19/0xf0 [ 175.618888][T13754] new_inode+0x1f/0x40 [ 175.622968][T13754] shmem_get_inode+0x84/0x7e0 [ 175.627665][T13754] __shmem_file_setup.part.0+0x7e/0x2b0 [ 175.633233][T13754] shmem_file_setup+0x66/0x90 [ 175.637931][T13754] __x64_sys_memfd_create+0x2a2/0x470 23:28:24 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 175.643330][T13754] ? memfd_fcntl+0x1580/0x1580 [ 175.648287][T13754] ? do_syscall_64+0x26/0x6a0 [ 175.652986][T13754] ? lockdep_hardirqs_on+0x418/0x5d0 [ 175.658297][T13754] ? trace_hardirqs_on+0x67/0x240 [ 175.663347][T13754] do_syscall_64+0xfd/0x6a0 [ 175.667885][T13754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.673802][T13754] RIP: 0033:0x459819 [ 175.677773][T13754] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.697389][T13754] RSP: 002b:00007fd8cccada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 175.705813][T13754] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 [ 175.713793][T13754] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 175.721772][T13754] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 175.729766][T13754] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8cccae6d4 [ 175.737771][T13754] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 23:28:24 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4000000000000000) [ 175.748324][T13755] CPU: 0 PID: 13755 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 175.755975][T13755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.766034][T13755] Call Trace: [ 175.769334][T13755] dump_stack+0x172/0x1f0 [ 175.773701][T13755] should_fail.cold+0xa/0x15 [ 175.778320][T13755] ? fault_create_debugfs_attr+0x180/0x180 [ 175.784146][T13755] ? ___might_sleep+0x163/0x280 [ 175.789014][T13755] __should_failslab+0x121/0x190 [ 175.793966][T13755] should_failslab+0x9/0x14 [ 175.798474][T13755] kmem_cache_alloc+0x2aa/0x710 [ 175.803328][T13755] ? kernel_text_address+0x73/0xf0 [ 175.808450][T13755] ? __kernel_text_address+0xd/0x40 [ 175.813749][T13755] __d_alloc+0x2e/0x8c0 [ 175.817918][T13755] d_alloc+0x4d/0x280 [ 175.821901][T13755] ? __kasan_check_read+0x11/0x20 [ 175.826947][T13755] d_alloc_parallel+0xf4/0x1c30 [ 175.831845][T13755] ? __kasan_check_read+0x11/0x20 [ 175.836877][T13755] ? __lock_acquire+0x8a0/0x4690 [ 175.841823][T13755] ? __kasan_check_read+0x11/0x20 [ 175.846861][T13755] ? mark_lock+0xc0/0x11e0 [ 175.851301][T13755] ? __d_lookup_rcu+0x6c0/0x6c0 [ 175.856165][T13755] ? __d_lookup+0x408/0x760 [ 175.860680][T13755] ? lockdep_init_map+0x1be/0x6d0 [ 175.865716][T13755] ? lockdep_init_map+0x1be/0x6d0 [ 175.870767][T13755] __lookup_slow+0x1ab/0x500 [ 175.875369][T13755] ? vfs_unlink+0x620/0x620 [ 175.879903][T13755] ? trailing_symlink+0x990/0x990 [ 175.884938][T13755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 175.891199][T13755] lookup_slow+0x58/0x80 [ 175.895455][T13755] walk_component+0x747/0x2000 [ 175.900229][T13755] ? selinux_capable+0x40/0x40 [ 175.905006][T13755] ? path_init+0x18f0/0x18f0 [ 175.909707][T13755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.915952][T13755] ? security_inode_permission+0xcb/0x100 [ 175.921685][T13755] ? inode_permission+0xb4/0x560 [ 175.926634][T13755] link_path_walk.part.0+0x9a4/0x1340 [ 175.932025][T13755] ? walk_component+0x2000/0x2000 [ 175.937069][T13755] path_openat+0x202/0x46d0 [ 175.941587][T13755] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 175.947400][T13755] ? kasan_slab_alloc+0xf/0x20 [ 175.952238][T13755] ? kmem_cache_alloc+0x121/0x710 [ 175.957267][T13755] ? getname_flags+0xd6/0x5b0 [ 175.961944][T13755] ? getname+0x1a/0x20 [ 175.966025][T13755] ? do_sys_open+0x2c9/0x5d0 [ 175.970628][T13755] ? __kasan_check_read+0x11/0x20 [ 175.975658][T13755] ? __kasan_check_read+0x11/0x20 [ 175.980791][T13755] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 175.986268][T13755] ? __alloc_fd+0x487/0x620 [ 175.990788][T13755] do_filp_open+0x1a1/0x280 [ 175.995302][T13755] ? may_open_dev+0x100/0x100 [ 175.999992][T13755] ? simple_attr_release+0x50/0x50 [ 176.005106][T13755] ? do_raw_spin_unlock+0x57/0x270 [ 176.010234][T13755] ? _raw_spin_unlock+0x2d/0x50 [ 176.015112][T13755] do_sys_open+0x3fe/0x5d0 [ 176.019566][T13755] ? filp_open+0x80/0x80 [ 176.023839][T13755] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.029305][T13755] ? do_syscall_64+0x26/0x6a0 [ 176.033986][T13755] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.040059][T13755] ? do_syscall_64+0x26/0x6a0 [ 176.044756][T13755] __x64_sys_open+0x7e/0xc0 [ 176.049271][T13755] do_syscall_64+0xfd/0x6a0 [ 176.053791][T13755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.059692][T13755] RIP: 0033:0x413701 [ 176.063591][T13755] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 176.083376][T13755] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 176.091794][T13755] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 176.099881][T13755] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 176.107873][T13755] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 176.115864][T13755] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 176.123864][T13755] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 176.131962][T13756] CPU: 1 PID: 13756 Comm: syz-executor.3 Not tainted 5.2.0+ #56 [ 176.139612][T13756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:28:24 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 176.149671][T13756] Call Trace: [ 176.152967][T13756] dump_stack+0x172/0x1f0 [ 176.152989][T13756] should_fail.cold+0xa/0x15 [ 176.153008][T13756] ? fault_create_debugfs_attr+0x180/0x180 [ 176.153030][T13756] ? ___might_sleep+0x163/0x280 [ 176.153049][T13756] __should_failslab+0x121/0x190 [ 176.153065][T13756] ? shmem_destroy_inode+0x80/0x80 [ 176.153081][T13756] should_failslab+0x9/0x14 [ 176.153103][T13756] kmem_cache_alloc+0x2aa/0x710 [ 176.192074][T13756] ? __alloc_fd+0x487/0x620 [ 176.196602][T13756] ? shmem_destroy_inode+0x80/0x80 [ 176.201732][T13756] shmem_alloc_inode+0x1c/0x50 [ 176.206512][T13756] alloc_inode+0x68/0x1e0 [ 176.210861][T13756] new_inode_pseudo+0x19/0xf0 [ 176.215556][T13756] new_inode+0x1f/0x40 [ 176.219636][T13756] shmem_get_inode+0x84/0x7e0 [ 176.224330][T13756] __shmem_file_setup.part.0+0x7e/0x2b0 [ 176.229895][T13756] shmem_file_setup+0x66/0x90 [ 176.234585][T13756] __x64_sys_memfd_create+0x2a2/0x470 [ 176.239969][T13756] ? memfd_fcntl+0x1580/0x1580 [ 176.244740][T13756] ? do_syscall_64+0x26/0x6a0 [ 176.249434][T13756] ? lockdep_hardirqs_on+0x418/0x5d0 [ 176.254731][T13756] ? trace_hardirqs_on+0x67/0x240 [ 176.259794][T13756] do_syscall_64+0xfd/0x6a0 [ 176.264315][T13756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.270214][T13756] RIP: 0033:0x459819 [ 176.274124][T13756] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:28:24 executing program 5 (fault-call:0 fault-nth:5): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:25 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 176.293858][T13756] RSP: 002b:00007f773470ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 176.302288][T13756] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 [ 176.310275][T13756] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 176.318263][T13756] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 176.326242][T13756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f773470f6d4 [ 176.326258][T13756] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 23:28:25 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 176.393913][T13774] FAULT_INJECTION: forcing a failure. [ 176.393913][T13774] name failslab, interval 1, probability 0, space 0, times 0 [ 176.416229][T13778] FAULT_INJECTION: forcing a failure. [ 176.416229][T13778] name failslab, interval 1, probability 0, space 0, times 0 [ 176.429583][T13766] XFS (loop0): Invalid superblock magic number [ 176.452704][T13774] CPU: 1 PID: 13774 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 176.460383][T13774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.470446][T13774] Call Trace: [ 176.473754][T13774] dump_stack+0x172/0x1f0 [ 176.478111][T13774] should_fail.cold+0xa/0x15 [ 176.482720][T13774] ? fault_create_debugfs_attr+0x180/0x180 [ 176.488546][T13774] ? ___might_sleep+0x163/0x280 [ 176.493419][T13774] __should_failslab+0x121/0x190 [ 176.498372][T13774] ? proc_free_inode+0x20/0x20 [ 176.503159][T13774] should_failslab+0x9/0x14 [ 176.507691][T13774] kmem_cache_alloc+0x2aa/0x710 [ 176.512553][T13774] ? find_held_lock+0x35/0x130 [ 176.517331][T13774] ? get_pid_task+0xc9/0x190 [ 176.521935][T13774] ? proc_free_inode+0x20/0x20 [ 176.526706][T13774] proc_alloc_inode+0x1c/0x1a0 [ 176.531475][T13774] alloc_inode+0x68/0x1e0 [ 176.535813][T13774] new_inode_pseudo+0x19/0xf0 [ 176.540499][T13774] new_inode+0x1f/0x40 [ 176.544575][T13774] proc_pid_make_inode+0x22/0x230 [ 176.549624][T13774] proc_pident_instantiate+0x82/0x2a0 [ 176.555010][T13774] proc_pident_lookup+0x1ad/0x210 [ 176.560058][T13774] proc_tgid_base_lookup+0x2c/0x40 [ 176.565270][T13774] __lookup_slow+0x279/0x500 [ 176.569874][T13774] ? vfs_unlink+0x620/0x620 [ 176.574420][T13774] ? trailing_symlink+0x990/0x990 [ 176.579454][T13774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 176.585801][T13774] lookup_slow+0x58/0x80 [ 176.590055][T13774] walk_component+0x747/0x2000 [ 176.594827][T13774] ? selinux_capable+0x40/0x40 [ 176.599602][T13774] ? path_init+0x18f0/0x18f0 [ 176.604206][T13774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.610456][T13774] ? security_inode_permission+0xcb/0x100 [ 176.616194][T13774] ? inode_permission+0xb4/0x560 [ 176.621147][T13774] link_path_walk.part.0+0x9a4/0x1340 [ 176.626536][T13774] ? walk_component+0x2000/0x2000 [ 176.631591][T13774] path_openat+0x202/0x46d0 [ 176.636198][T13774] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 176.642011][T13774] ? kasan_slab_alloc+0xf/0x20 [ 176.642027][T13774] ? kmem_cache_alloc+0x121/0x710 [ 176.642042][T13774] ? getname_flags+0xd6/0x5b0 [ 176.642062][T13774] ? getname+0x1a/0x20 [ 176.656517][T13774] ? do_sys_open+0x2c9/0x5d0 [ 176.656553][T13774] ? __kasan_check_read+0x11/0x20 [ 176.670257][T13774] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 176.670292][T13774] ? __alloc_fd+0x487/0x620 [ 176.680175][T13774] do_filp_open+0x1a1/0x280 [ 176.684689][T13774] ? may_open_dev+0x100/0x100 [ 176.684719][T13774] ? simple_attr_release+0x50/0x50 [ 176.684737][T13774] ? do_raw_spin_unlock+0x57/0x270 [ 176.684756][T13774] ? _raw_spin_unlock+0x2d/0x50 [ 176.684790][T13774] do_sys_open+0x3fe/0x5d0 [ 176.684816][T13774] ? filp_open+0x80/0x80 [ 176.704531][T13774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.713202][T13774] ? do_syscall_64+0x26/0x6a0 [ 176.713217][T13774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.713231][T13774] ? do_syscall_64+0x26/0x6a0 [ 176.713262][T13774] __x64_sys_open+0x7e/0xc0 [ 176.713280][T13774] do_syscall_64+0xfd/0x6a0 [ 176.713298][T13774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.713310][T13774] RIP: 0033:0x413701 [ 176.713327][T13774] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 176.713334][T13774] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 176.713348][T13774] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 176.713355][T13774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 176.713363][T13774] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 176.713372][T13774] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 176.713381][T13774] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 176.759614][T13778] CPU: 1 PID: 13778 Comm: syz-executor.1 Not tainted 5.2.0+ #56 [ 176.829236][T13778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.839323][T13778] Call Trace: [ 176.842639][T13778] dump_stack+0x172/0x1f0 [ 176.846999][T13778] should_fail.cold+0xa/0x15 [ 176.851616][T13778] ? fault_create_debugfs_attr+0x180/0x180 [ 176.857452][T13778] ? ___might_sleep+0x163/0x280 [ 176.862332][T13778] __should_failslab+0x121/0x190 [ 176.867295][T13778] should_failslab+0x9/0x14 [ 176.871819][T13778] kmem_cache_alloc+0x2aa/0x710 [ 176.876695][T13778] ? current_time+0x6b/0x140 [ 176.881303][T13778] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 176.887128][T13778] ? lockdep_hardirqs_on+0x418/0x5d0 [ 176.892642][T13778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.898901][T13778] ? timespec64_trunc+0xf0/0x180 [ 176.903854][T13778] __d_alloc+0x2e/0x8c0 [ 176.908114][T13778] d_alloc_pseudo+0x1e/0x70 [ 176.912617][T13778] alloc_file_pseudo+0xe2/0x280 [ 176.917453][T13778] ? alloc_file+0x4d0/0x4d0 [ 176.921993][T13778] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 176.928229][T13778] __shmem_file_setup.part.0+0x108/0x2b0 [ 176.933854][T13778] shmem_file_setup+0x66/0x90 [ 176.938540][T13778] __x64_sys_memfd_create+0x2a2/0x470 [ 176.943899][T13778] ? memfd_fcntl+0x1580/0x1580 [ 176.948647][T13778] ? do_syscall_64+0x26/0x6a0 [ 176.953319][T13778] ? lockdep_hardirqs_on+0x418/0x5d0 [ 176.958592][T13778] ? trace_hardirqs_on+0x67/0x240 [ 176.963606][T13778] do_syscall_64+0xfd/0x6a0 [ 176.968096][T13778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.973970][T13778] RIP: 0033:0x459819 [ 176.977868][T13778] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.997460][T13778] RSP: 002b:00007fd8cccada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 177.005858][T13778] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 [ 177.014205][T13778] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 177.022187][T13778] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 177.030161][T13778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8cccae6d4 [ 177.042379][T13778] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 23:28:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:28:26 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4603000000000000) 23:28:26 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:26 executing program 5 (fault-call:0 fault-nth:6): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:26 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:26 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4800000000000000) [ 177.369866][T13797] FAULT_INJECTION: forcing a failure. [ 177.369866][T13797] name failslab, interval 1, probability 0, space 0, times 0 [ 177.384299][T13798] FAULT_INJECTION: forcing a failure. [ 177.384299][T13798] name failslab, interval 1, probability 0, space 0, times 0 [ 177.410298][T13798] CPU: 0 PID: 13798 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 177.417966][T13798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.417974][T13798] Call Trace: [ 177.418001][T13798] dump_stack+0x172/0x1f0 [ 177.418030][T13798] should_fail.cold+0xa/0x15 [ 177.418057][T13798] ? fault_create_debugfs_attr+0x180/0x180 [ 177.440415][T13798] ? ___might_sleep+0x163/0x280 [ 177.440440][T13798] __should_failslab+0x121/0x190 [ 177.440458][T13798] ? proc_free_inode+0x20/0x20 [ 177.440475][T13798] should_failslab+0x9/0x14 [ 177.440497][T13798] kmem_cache_alloc+0x2aa/0x710 [ 177.470226][T13798] ? find_held_lock+0x35/0x130 [ 177.475005][T13798] ? get_pid_task+0xc9/0x190 [ 177.479613][T13798] ? proc_free_inode+0x20/0x20 [ 177.484390][T13798] proc_alloc_inode+0x1c/0x1a0 [ 177.489174][T13798] alloc_inode+0x68/0x1e0 [ 177.493512][T13798] new_inode_pseudo+0x19/0xf0 [ 177.498197][T13798] new_inode+0x1f/0x40 [ 177.502270][T13798] proc_pid_make_inode+0x22/0x230 [ 177.507392][T13798] proc_pident_instantiate+0x82/0x2a0 [ 177.512784][T13798] proc_pident_lookup+0x1ad/0x210 [ 177.517834][T13798] proc_tgid_base_lookup+0x2c/0x40 [ 177.522955][T13798] __lookup_slow+0x279/0x500 [ 177.527553][T13798] ? vfs_unlink+0x620/0x620 [ 177.532082][T13798] ? trailing_symlink+0x990/0x990 [ 177.537122][T13798] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 177.543382][T13798] lookup_slow+0x58/0x80 [ 177.547641][T13798] walk_component+0x747/0x2000 [ 177.552413][T13798] ? selinux_capable+0x40/0x40 [ 177.557193][T13798] ? path_init+0x18f0/0x18f0 [ 177.561802][T13798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 177.568049][T13798] ? security_inode_permission+0xcb/0x100 [ 177.573784][T13798] ? inode_permission+0xb4/0x560 [ 177.578731][T13798] link_path_walk.part.0+0x9a4/0x1340 [ 177.584131][T13798] ? walk_component+0x2000/0x2000 [ 177.589175][T13798] path_openat+0x202/0x46d0 [ 177.593686][T13798] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 177.599490][T13798] ? kasan_slab_alloc+0xf/0x20 [ 177.604266][T13798] ? kmem_cache_alloc+0x121/0x710 [ 177.609297][T13798] ? getname_flags+0xd6/0x5b0 [ 177.613975][T13798] ? getname+0x1a/0x20 [ 177.618047][T13798] ? do_sys_open+0x2c9/0x5d0 [ 177.622659][T13798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 177.628907][T13798] ? __kasan_check_read+0x11/0x20 [ 177.633943][T13798] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 177.639449][T13798] ? __alloc_fd+0x487/0x620 [ 177.643973][T13798] do_filp_open+0x1a1/0x280 [ 177.648486][T13798] ? may_open_dev+0x100/0x100 [ 177.653183][T13798] ? simple_attr_release+0x50/0x50 [ 177.658332][T13798] ? do_raw_spin_unlock+0x57/0x270 [ 177.663459][T13798] ? _raw_spin_unlock+0x2d/0x50 [ 177.668330][T13798] do_sys_open+0x3fe/0x5d0 [ 177.672771][T13798] ? filp_open+0x80/0x80 [ 177.677026][T13798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 177.682489][T13798] ? do_syscall_64+0x26/0x6a0 [ 177.687170][T13798] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.693242][T13798] ? do_syscall_64+0x26/0x6a0 [ 177.697956][T13798] __x64_sys_open+0x7e/0xc0 [ 177.702478][T13798] do_syscall_64+0xfd/0x6a0 [ 177.707003][T13798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.712893][T13798] RIP: 0033:0x413701 [ 177.716789][T13798] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 177.736405][T13798] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 177.744857][T13798] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 177.752832][T13798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 177.760805][T13798] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:28:26 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 177.768793][T13798] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 177.776798][T13798] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 177.784807][T13797] CPU: 1 PID: 13797 Comm: syz-executor.1 Not tainted 5.2.0+ #56 [ 177.792452][T13797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.792459][T13797] Call Trace: [ 177.792481][T13797] dump_stack+0x172/0x1f0 [ 177.792504][T13797] should_fail.cold+0xa/0x15 [ 177.792525][T13797] ? fault_create_debugfs_attr+0x180/0x180 23:28:26 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4c00000000000000) [ 177.792550][T13797] ? ___might_sleep+0x163/0x280 [ 177.805985][T13797] __should_failslab+0x121/0x190 [ 177.830437][T13797] should_failslab+0x9/0x14 [ 177.834964][T13797] kmem_cache_alloc+0x2aa/0x710 [ 177.839826][T13797] ? rwlock_bug.part.0+0x90/0x90 [ 177.844775][T13797] ? lock_downgrade+0x920/0x920 [ 177.849634][T13797] __alloc_file+0x27/0x300 [ 177.854058][T13797] alloc_empty_file+0x72/0x170 [ 177.854075][T13797] alloc_file+0x5e/0x4d0 [ 177.854093][T13797] alloc_file_pseudo+0x189/0x280 [ 177.854109][T13797] ? alloc_file+0x4d0/0x4d0 [ 177.854128][T13797] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 177.854152][T13797] __shmem_file_setup.part.0+0x108/0x2b0 [ 177.854173][T13797] shmem_file_setup+0x66/0x90 [ 177.854198][T13797] __x64_sys_memfd_create+0x2a2/0x470 [ 177.894551][T13797] ? memfd_fcntl+0x1580/0x1580 [ 177.894569][T13797] ? do_syscall_64+0x26/0x6a0 [ 177.894587][T13797] ? lockdep_hardirqs_on+0x418/0x5d0 [ 177.894602][T13797] ? trace_hardirqs_on+0x67/0x240 [ 177.894625][T13797] do_syscall_64+0xfd/0x6a0 [ 177.918846][T13797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.918859][T13797] RIP: 0033:0x459819 [ 177.918880][T13797] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.948334][T13797] RSP: 002b:00007fd8cccada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 177.956760][T13797] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 23:28:26 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 177.964746][T13797] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 177.972731][T13797] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 177.980713][T13797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8cccae6d4 [ 177.988697][T13797] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 23:28:26 executing program 5 (fault-call:0 fault-nth:7): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 178.050551][T13795] XFS (loop3): Mounting V4 Filesystem 23:28:26 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6800000000000000) [ 178.096066][T13795] XFS (loop3): empty log check failed [ 178.119461][T13795] XFS (loop3): log mount/recovery failed: error -5 [ 178.133553][T13827] FAULT_INJECTION: forcing a failure. [ 178.133553][T13827] name failslab, interval 1, probability 0, space 0, times 0 [ 178.208532][T13813] XFS (loop0): Invalid superblock magic number [ 178.252869][T13795] XFS (loop3): log mount failed [ 178.272556][T13827] CPU: 1 PID: 13827 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 178.280232][T13827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.290749][T13827] Call Trace: [ 178.294064][T13827] dump_stack+0x172/0x1f0 [ 178.298418][T13827] should_fail.cold+0xa/0x15 [ 178.303048][T13827] ? fault_create_debugfs_attr+0x180/0x180 [ 178.308871][T13827] ? ___might_sleep+0x163/0x280 [ 178.313744][T13827] __should_failslab+0x121/0x190 [ 178.318700][T13827] should_failslab+0x9/0x14 [ 178.323219][T13827] kmem_cache_alloc+0x2aa/0x710 [ 178.328087][T13827] ? __put_user_ns+0x70/0x70 [ 178.332699][T13827] ? rcu_read_lock_sched_held+0x110/0x130 [ 178.338582][T13827] security_inode_alloc+0x39/0x160 [ 178.343712][T13827] inode_init_always+0x56e/0xb50 [ 178.348661][T13827] alloc_inode+0x89/0x1e0 [ 178.352999][T13827] new_inode_pseudo+0x19/0xf0 [ 178.353016][T13827] new_inode+0x1f/0x40 [ 178.353030][T13827] proc_pid_make_inode+0x22/0x230 [ 178.353046][T13827] proc_pident_instantiate+0x82/0x2a0 [ 178.353063][T13827] proc_pident_lookup+0x1ad/0x210 [ 178.353084][T13827] proc_tgid_base_lookup+0x2c/0x40 [ 178.353100][T13827] __lookup_slow+0x279/0x500 [ 178.353117][T13827] ? vfs_unlink+0x620/0x620 [ 178.353150][T13827] ? trailing_symlink+0x990/0x990 [ 178.396487][T13827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 178.402754][T13827] lookup_slow+0x58/0x80 [ 178.407022][T13827] walk_component+0x747/0x2000 [ 178.411811][T13827] ? selinux_capable+0x40/0x40 [ 178.416596][T13827] ? path_init+0x18f0/0x18f0 [ 178.421234][T13827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.427496][T13827] ? security_inode_permission+0xcb/0x100 [ 178.433235][T13827] ? inode_permission+0xb4/0x560 [ 178.438203][T13827] link_path_walk.part.0+0x9a4/0x1340 [ 178.443609][T13827] ? walk_component+0x2000/0x2000 [ 178.448644][T13827] path_openat+0x202/0x46d0 [ 178.453151][T13827] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 178.458957][T13827] ? kasan_slab_alloc+0xf/0x20 [ 178.463728][T13827] ? kmem_cache_alloc+0x121/0x710 [ 178.468745][T13827] ? getname_flags+0xd6/0x5b0 [ 178.473418][T13827] ? getname+0x1a/0x20 [ 178.477491][T13827] ? do_sys_open+0x2c9/0x5d0 [ 178.482107][T13827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.488365][T13827] ? __kasan_check_read+0x11/0x20 [ 178.493390][T13827] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 178.498805][T13827] ? __alloc_fd+0x487/0x620 [ 178.503322][T13827] do_filp_open+0x1a1/0x280 [ 178.507850][T13827] ? may_open_dev+0x100/0x100 [ 178.512545][T13827] ? simple_attr_release+0x50/0x50 [ 178.517678][T13827] ? do_raw_spin_unlock+0x57/0x270 [ 178.522797][T13827] ? _raw_spin_unlock+0x2d/0x50 [ 178.527659][T13827] do_sys_open+0x3fe/0x5d0 [ 178.532080][T13827] ? filp_open+0x80/0x80 [ 178.536316][T13827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.541769][T13827] ? do_syscall_64+0x26/0x6a0 [ 178.546439][T13827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.552508][T13827] ? do_syscall_64+0x26/0x6a0 [ 178.557216][T13827] __x64_sys_open+0x7e/0xc0 [ 178.561712][T13827] do_syscall_64+0xfd/0x6a0 [ 178.566212][T13827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.572124][T13827] RIP: 0033:0x413701 [ 178.576029][T13827] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 178.595646][T13827] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 178.604065][T13827] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 178.612173][T13827] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 178.620249][T13827] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.628803][T13827] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 178.636802][T13827] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:27 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:27 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:27 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6c00000000000000) [ 178.923973][T13842] FAULT_INJECTION: forcing a failure. [ 178.923973][T13842] name failslab, interval 1, probability 0, space 0, times 0 [ 178.949450][T13842] CPU: 0 PID: 13842 Comm: syz-executor.1 Not tainted 5.2.0+ #56 [ 178.957141][T13842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.967209][T13842] Call Trace: [ 178.970519][T13842] dump_stack+0x172/0x1f0 [ 178.975226][T13842] should_fail.cold+0xa/0x15 [ 178.979871][T13842] ? fault_create_debugfs_attr+0x180/0x180 [ 178.985693][T13842] ? ___might_sleep+0x163/0x280 [ 178.990559][T13842] __should_failslab+0x121/0x190 [ 178.995487][T13842] should_failslab+0x9/0x14 [ 178.999975][T13842] kmem_cache_alloc+0x2aa/0x710 [ 179.004813][T13842] ? rcu_read_lock_sched_held+0x110/0x130 [ 179.010519][T13842] ? kmem_cache_alloc+0x364/0x710 [ 179.015535][T13842] security_file_alloc+0x39/0x170 [ 179.020566][T13842] __alloc_file+0xac/0x300 [ 179.024972][T13842] alloc_empty_file+0x72/0x170 [ 179.029743][T13842] alloc_file+0x5e/0x4d0 [ 179.033982][T13842] alloc_file_pseudo+0x189/0x280 [ 179.046051][T13842] ? alloc_file+0x4d0/0x4d0 [ 179.050710][T13842] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 179.056950][T13842] __shmem_file_setup.part.0+0x108/0x2b0 [ 179.062574][T13842] shmem_file_setup+0x66/0x90 [ 179.067238][T13842] __x64_sys_memfd_create+0x2a2/0x470 [ 179.072599][T13842] ? memfd_fcntl+0x1580/0x1580 [ 179.077347][T13842] ? do_syscall_64+0x26/0x6a0 [ 179.082013][T13842] ? lockdep_hardirqs_on+0x418/0x5d0 [ 179.087304][T13842] ? trace_hardirqs_on+0x67/0x240 [ 179.092319][T13842] do_syscall_64+0xfd/0x6a0 [ 179.096837][T13842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.102926][T13842] RIP: 0033:0x459819 23:28:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:28:27 executing program 5 (fault-call:0 fault-nth:8): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:27 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x6d41000000000000) 23:28:27 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 179.106991][T13842] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.126612][T13842] RSP: 002b:00007fd8cccada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 179.135156][T13842] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459819 [ 179.143138][T13842] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be72c [ 179.151093][T13842] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 179.159053][T13842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8cccae6d4 [ 179.167010][T13842] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 [ 179.207310][T13846] FAULT_INJECTION: forcing a failure. [ 179.207310][T13846] name failslab, interval 1, probability 0, space 0, times 0 [ 179.220929][T13846] CPU: 1 PID: 13846 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 179.228587][T13846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.238692][T13846] Call Trace: [ 179.242000][T13846] dump_stack+0x172/0x1f0 [ 179.246452][T13846] should_fail.cold+0xa/0x15 [ 179.251482][T13846] ? fault_create_debugfs_attr+0x180/0x180 [ 179.257299][T13846] ? ___might_sleep+0x163/0x280 [ 179.262156][T13846] __should_failslab+0x121/0x190 [ 179.267098][T13846] should_failslab+0x9/0x14 [ 179.271603][T13846] kmem_cache_alloc+0x2aa/0x710 [ 179.276443][T13846] ? __put_user_ns+0x70/0x70 [ 179.281021][T13846] ? rcu_read_lock_sched_held+0x110/0x130 [ 179.286746][T13846] security_inode_alloc+0x39/0x160 [ 179.291917][T13846] inode_init_always+0x56e/0xb50 [ 179.296850][T13846] alloc_inode+0x89/0x1e0 [ 179.301164][T13846] new_inode_pseudo+0x19/0xf0 [ 179.305847][T13846] new_inode+0x1f/0x40 [ 179.309919][T13846] proc_pid_make_inode+0x22/0x230 [ 179.314930][T13846] proc_pident_instantiate+0x82/0x2a0 [ 179.320321][T13846] proc_pident_lookup+0x1ad/0x210 [ 179.325449][T13846] proc_tgid_base_lookup+0x2c/0x40 [ 179.330558][T13846] __lookup_slow+0x279/0x500 [ 179.335143][T13846] ? vfs_unlink+0x620/0x620 [ 179.339639][T13846] ? trailing_symlink+0x990/0x990 [ 179.344660][T13846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 179.350899][T13846] lookup_slow+0x58/0x80 [ 179.355245][T13846] walk_component+0x747/0x2000 [ 179.360009][T13846] ? selinux_capable+0x40/0x40 [ 179.364770][T13846] ? path_init+0x18f0/0x18f0 [ 179.369382][T13846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.375616][T13846] ? security_inode_permission+0xcb/0x100 [ 179.381325][T13846] ? inode_permission+0xb4/0x560 [ 179.386279][T13846] link_path_walk.part.0+0x9a4/0x1340 [ 179.391911][T13846] ? walk_component+0x2000/0x2000 [ 179.396961][T13846] path_openat+0x202/0x46d0 [ 179.401481][T13846] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 179.407290][T13846] ? kasan_slab_alloc+0xf/0x20 [ 179.412057][T13846] ? kmem_cache_alloc+0x121/0x710 [ 179.417068][T13846] ? getname_flags+0xd6/0x5b0 [ 179.421728][T13846] ? getname+0x1a/0x20 [ 179.425800][T13846] ? do_sys_open+0x2c9/0x5d0 [ 179.430413][T13846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.436640][T13846] ? __kasan_check_read+0x11/0x20 [ 179.441650][T13846] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 179.447037][T13846] ? __irqentry_text_end+0x1e0bc2/0x1fa742 [ 179.452851][T13846] ? __alloc_fd+0x487/0x620 [ 179.457355][T13846] do_filp_open+0x1a1/0x280 [ 179.461841][T13846] ? may_open_dev+0x100/0x100 [ 179.466526][T13846] ? simple_attr_release+0x50/0x50 [ 179.471724][T13846] ? do_raw_spin_unlock+0x57/0x270 [ 179.476832][T13846] ? _raw_spin_unlock+0x2d/0x50 [ 179.481699][T13846] do_sys_open+0x3fe/0x5d0 [ 179.486119][T13846] ? filp_open+0x80/0x80 [ 179.490364][T13846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 179.495824][T13846] ? do_syscall_64+0x26/0x6a0 [ 179.500503][T13846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.506564][T13846] ? do_syscall_64+0x26/0x6a0 [ 179.511277][T13846] __x64_sys_open+0x7e/0xc0 [ 179.515775][T13846] do_syscall_64+0xfd/0x6a0 [ 179.520296][T13846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.526180][T13846] RIP: 0033:0x413701 [ 179.530073][T13846] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 179.549682][T13846] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 23:28:28 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 179.558103][T13846] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 179.566091][T13846] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 179.574062][T13846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 179.582021][T13846] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 179.589978][T13846] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:28 executing program 5 (fault-call:0 fault-nth:9): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 179.736250][T13860] FAULT_INJECTION: forcing a failure. [ 179.736250][T13860] name failslab, interval 1, probability 0, space 0, times 0 23:28:28 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 179.807421][T13853] XFS (loop0): Invalid superblock magic number 23:28:28 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7400000000000000) [ 179.848373][T13871] FAULT_INJECTION: forcing a failure. [ 179.848373][T13871] name failslab, interval 1, probability 0, space 0, times 0 [ 179.909144][T13860] CPU: 0 PID: 13860 Comm: syz-executor.1 Not tainted 5.2.0+ #56 [ 179.916909][T13860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.926974][T13860] Call Trace: [ 179.930286][T13860] dump_stack+0x172/0x1f0 [ 179.934646][T13860] should_fail.cold+0xa/0x15 [ 179.939257][T13860] ? fault_create_debugfs_attr+0x180/0x180 [ 179.945082][T13860] ? ___might_sleep+0x163/0x280 [ 179.949950][T13860] __should_failslab+0x121/0x190 [ 179.954989][T13860] should_failslab+0x9/0x14 [ 179.959511][T13860] __kmalloc+0x2e0/0x780 [ 179.963776][T13860] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 179.969502][T13860] ? rcu_read_lock_sched_held+0x110/0x130 [ 179.975229][T13860] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 179.980958][T13860] tomoyo_realpath_from_path+0xcd/0x7b0 [ 179.986707][T13860] ? tomoyo_path_perm+0x1cb/0x430 [ 179.991746][T13860] tomoyo_path_perm+0x230/0x430 [ 179.996613][T13860] ? tomoyo_path_perm+0x1cb/0x430 [ 180.001664][T13860] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 180.007750][T13860] ? __kasan_check_read+0x11/0x20 [ 180.012813][T13860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 180.019099][T13860] tomoyo_path_truncate+0x1d/0x30 [ 180.024144][T13860] security_path_truncate+0xf2/0x150 [ 180.029446][T13860] do_sys_ftruncate+0x3d9/0x550 [ 180.034314][T13860] __x64_sys_ftruncate+0x59/0x80 [ 180.039265][T13860] do_syscall_64+0xfd/0x6a0 [ 180.043787][T13860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.049705][T13860] RIP: 0033:0x4597e7 [ 180.053605][T13860] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.073223][T13860] RSP: 002b:00007fd8cccada88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 180.081732][T13860] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004597e7 [ 180.089718][T13860] RDX: 0000000020000128 RSI: 0000000008100000 RDI: 0000000000000004 [ 180.097698][T13860] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 23:28:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 180.105769][T13860] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 180.113747][T13860] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 0000000000000003 [ 180.121795][T13871] CPU: 1 PID: 13871 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 180.129448][T13871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.139513][T13871] Call Trace: [ 180.142833][T13871] dump_stack+0x172/0x1f0 [ 180.147282][T13871] should_fail.cold+0xa/0x15 [ 180.151907][T13871] ? fault_create_debugfs_attr+0x180/0x180 23:28:28 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 180.154387][T13860] ERROR: Out of memory at tomoyo_realpath_from_path. [ 180.157744][T13871] ? ___might_sleep+0x163/0x280 [ 180.157767][T13871] __should_failslab+0x121/0x190 [ 180.157785][T13871] ? proc_free_inode+0x20/0x20 [ 180.157802][T13871] should_failslab+0x9/0x14 [ 180.157825][T13871] kmem_cache_alloc+0x2aa/0x710 [ 180.188517][T13871] ? find_held_lock+0x35/0x130 [ 180.193303][T13871] ? get_pid_task+0xc9/0x190 [ 180.197912][T13871] ? proc_free_inode+0x20/0x20 [ 180.202691][T13871] proc_alloc_inode+0x1c/0x1a0 [ 180.207484][T13871] alloc_inode+0x68/0x1e0 [ 180.211805][T13871] new_inode_pseudo+0x19/0xf0 [ 180.216473][T13871] new_inode+0x1f/0x40 [ 180.220541][T13871] proc_pid_make_inode+0x22/0x230 [ 180.225567][T13871] proc_ns_instantiate+0x58/0x100 [ 180.230618][T13871] proc_ns_dir_lookup+0x1ac/0x210 [ 180.235667][T13871] ? proc_ns_instantiate+0x100/0x100 [ 180.241044][T13871] lookup_open+0x6cd/0x1a90 [ 180.245541][T13871] ? vfs_link+0xb90/0xb90 [ 180.249874][T13871] path_openat+0x1eb2/0x46d0 [ 180.254454][T13871] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 180.260285][T13871] ? kasan_slab_alloc+0xf/0x20 [ 180.265034][T13871] ? kmem_cache_alloc+0x121/0x710 [ 180.270040][T13871] ? getname_flags+0xd6/0x5b0 [ 180.274699][T13871] ? getname+0x1a/0x20 [ 180.279282][T13871] ? do_sys_open+0x2c9/0x5d0 [ 180.283861][T13871] ? __check_heap_object+0x20/0xb3 [ 180.288988][T13871] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 180.294350][T13871] ? __alloc_fd+0x487/0x620 [ 180.298840][T13871] do_filp_open+0x1a1/0x280 [ 180.303330][T13871] ? may_open_dev+0x100/0x100 [ 180.308002][T13871] ? simple_attr_release+0x50/0x50 [ 180.313097][T13871] ? do_raw_spin_unlock+0x57/0x270 [ 180.318195][T13871] ? _raw_spin_unlock+0x2d/0x50 [ 180.323038][T13871] do_sys_open+0x3fe/0x5d0 [ 180.327438][T13871] ? filp_open+0x80/0x80 [ 180.331685][T13871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 180.337140][T13871] ? do_syscall_64+0x26/0x6a0 [ 180.341822][T13871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.347878][T13871] ? do_syscall_64+0x26/0x6a0 [ 180.352563][T13871] __x64_sys_open+0x7e/0xc0 [ 180.357053][T13871] do_syscall_64+0xfd/0x6a0 [ 180.361542][T13871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.367421][T13871] RIP: 0033:0x413701 [ 180.371312][T13871] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 180.390922][T13871] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 180.399338][T13871] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 180.407296][T13871] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 180.415259][T13871] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.423215][T13871] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 180.431212][T13871] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:29 executing program 5 (fault-call:0 fault-nth:10): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:29 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x7a00000000000000) [ 180.656111][T13891] FAULT_INJECTION: forcing a failure. [ 180.656111][T13891] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 180.669383][T13891] CPU: 0 PID: 13891 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 180.677014][T13891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.687147][T13891] Call Trace: [ 180.690426][T13891] dump_stack+0x172/0x1f0 [ 180.694777][T13891] should_fail.cold+0xa/0x15 [ 180.699353][T13891] ? mark_lock+0xc0/0x11e0 [ 180.703819][T13891] ? fault_create_debugfs_attr+0x180/0x180 [ 180.709619][T13891] ? rcu_read_unlock+0x16/0x60 [ 180.714369][T13891] ? find_held_lock+0x35/0x130 [ 180.719129][T13891] should_fail_alloc_page+0x50/0x60 [ 180.724318][T13891] __alloc_pages_nodemask+0x1a1/0x900 [ 180.729679][T13891] ? lock_downgrade+0x920/0x920 [ 180.734518][T13891] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 180.740241][T13891] ? rcu_read_unlock+0x33/0x60 [ 180.745010][T13891] cache_grow_begin+0x90/0xd20 [ 180.749785][T13891] ? proc_alloc_inode+0x1c/0x1a0 [ 180.754713][T13891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 180.760938][T13891] kmem_cache_alloc+0x650/0x710 [ 180.765779][T13891] ? find_held_lock+0x35/0x130 [ 180.770535][T13891] ? proc_free_inode+0x20/0x20 [ 180.775374][T13891] proc_alloc_inode+0x1c/0x1a0 [ 180.780142][T13891] alloc_inode+0x68/0x1e0 [ 180.784473][T13891] new_inode_pseudo+0x19/0xf0 [ 180.789151][T13891] new_inode+0x1f/0x40 [ 180.793204][T13891] proc_pid_make_inode+0x22/0x230 [ 180.798222][T13891] proc_ns_instantiate+0x58/0x100 [ 180.803233][T13891] proc_ns_dir_lookup+0x1ac/0x210 [ 180.808250][T13891] ? proc_ns_instantiate+0x100/0x100 [ 180.813522][T13891] lookup_open+0x6cd/0x1a90 [ 180.818105][T13891] ? vfs_link+0xb90/0xb90 [ 180.822438][T13891] path_openat+0x1eb2/0x46d0 [ 180.827016][T13891] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 180.832918][T13891] ? kasan_slab_alloc+0xf/0x20 [ 180.837664][T13891] ? kmem_cache_alloc+0x121/0x710 [ 180.842772][T13891] ? getname_flags+0xd6/0x5b0 [ 180.847438][T13891] ? getname+0x1a/0x20 [ 180.851507][T13891] ? do_sys_open+0x2c9/0x5d0 [ 180.856108][T13891] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 180.861485][T13891] ? __alloc_fd+0x487/0x620 [ 180.865974][T13891] do_filp_open+0x1a1/0x280 [ 180.870478][T13891] ? may_open_dev+0x100/0x100 [ 180.875144][T13891] ? simple_attr_release+0x50/0x50 [ 180.880240][T13891] ? do_raw_spin_unlock+0x57/0x270 [ 180.885455][T13891] ? _raw_spin_unlock+0x2d/0x50 [ 180.890325][T13891] do_sys_open+0x3fe/0x5d0 [ 180.894799][T13891] ? filp_open+0x80/0x80 [ 180.899222][T13891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 180.904676][T13891] ? do_syscall_64+0x26/0x6a0 [ 180.909365][T13891] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.915429][T13891] ? do_syscall_64+0x26/0x6a0 [ 180.920114][T13891] __x64_sys_open+0x7e/0xc0 [ 180.924608][T13891] do_syscall_64+0xfd/0x6a0 [ 180.929180][T13891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.935051][T13891] RIP: 0033:0x413701 [ 180.938928][T13891] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 180.958561][T13891] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 180.966963][T13891] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 180.975101][T13891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 180.983054][T13891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.991010][T13891] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 180.998962][T13891] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 23:28:29 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:29 executing program 5 (fault-call:0 fault-nth:11): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:29 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:29 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x8004000000000000) [ 181.232058][T13906] FAULT_INJECTION: forcing a failure. [ 181.232058][T13906] name failslab, interval 1, probability 0, space 0, times 0 [ 181.256958][T13906] CPU: 0 PID: 13906 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 181.264627][T13906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.274863][T13906] Call Trace: [ 181.274897][T13906] dump_stack+0x172/0x1f0 [ 181.282506][T13906] should_fail.cold+0xa/0x15 [ 181.282526][T13906] ? fault_create_debugfs_attr+0x180/0x180 [ 181.282548][T13906] ? ___might_sleep+0x163/0x280 [ 181.282567][T13906] __should_failslab+0x121/0x190 [ 181.282589][T13906] should_failslab+0x9/0x14 [ 181.302737][T13906] kmem_cache_alloc+0x2aa/0x710 [ 181.302764][T13906] ? lock_downgrade+0x920/0x920 [ 181.302785][T13906] ? group_pin_kill+0x1c0/0x1c0 [ 181.321814][T13906] alloc_inode+0x16f/0x1e0 [ 181.326249][T13906] new_inode_pseudo+0x19/0xf0 [ 181.331031][T13906] __ns_get_path.isra.0+0x13c/0x770 [ 181.336242][T13906] ? group_pin_kill+0x1c0/0x1c0 [ 181.336258][T13906] ns_get_path_cb+0x33/0x70 [ 181.336283][T13906] ns_get_path+0x81/0xb0 [ 181.349869][T13906] ? ns_get_path_cb+0x70/0x70 [ 181.354561][T13906] ? do_raw_spin_unlock+0x57/0x270 [ 181.359684][T13906] ? _raw_spin_unlock+0x2d/0x50 [ 181.364550][T13906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.370811][T13906] proc_ns_get_link+0x170/0x1b0 [ 181.375675][T13906] ? proc_ns_readlink+0x240/0x240 [ 181.380722][T13906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.386980][T13906] ? security_inode_follow_link+0xe4/0x120 [ 181.392813][T13906] trailing_symlink+0x785/0x990 [ 181.397673][T13906] ? proc_ns_readlink+0x240/0x240 [ 181.402715][T13906] path_openat+0xa95/0x46d0 [ 181.407225][T13906] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 181.413037][T13906] ? kasan_slab_alloc+0xf/0x20 [ 181.417821][T13906] ? kmem_cache_alloc+0x121/0x710 [ 181.422855][T13906] ? getname_flags+0xd6/0x5b0 [ 181.427536][T13906] ? getname+0x1a/0x20 [ 181.431616][T13906] ? do_sys_open+0x2c9/0x5d0 [ 181.436236][T13906] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 181.441633][T13906] ? __alloc_fd+0x487/0x620 [ 181.446147][T13906] do_filp_open+0x1a1/0x280 [ 181.446163][T13906] ? may_open_dev+0x100/0x100 [ 181.446190][T13906] ? do_raw_spin_unlock+0x57/0x270 [ 181.446211][T13906] ? _raw_spin_unlock+0x2d/0x50 [ 181.446242][T13906] do_sys_open+0x3fe/0x5d0 [ 181.469780][T13906] ? filp_open+0x80/0x80 [ 181.474042][T13906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.479517][T13906] ? do_syscall_64+0x26/0x6a0 [ 181.484207][T13906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.490380][T13906] ? do_syscall_64+0x26/0x6a0 [ 181.495080][T13906] __x64_sys_open+0x7e/0xc0 [ 181.499695][T13906] do_syscall_64+0xfd/0x6a0 [ 181.504304][T13906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.510292][T13906] RIP: 0033:0x413701 23:28:30 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xc000000000000000) 23:28:30 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 181.514381][T13906] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 181.534616][T13906] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 181.543050][T13906] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 181.551041][T13906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 181.559461][T13906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.567443][T13906] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 181.575429][T13906] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:30 executing program 5 (fault-call:0 fault-nth:12): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 181.671402][T13913] XFS (loop0): Invalid superblock magic number [ 181.694118][T13900] XFS (loop1): Mounting V4 Filesystem 23:28:30 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xf6ffffff00000000) [ 181.747291][T13900] XFS (loop1): empty log check failed 23:28:30 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 181.793276][T13900] XFS (loop1): log mount/recovery failed: error -5 [ 181.832019][T13944] FAULT_INJECTION: forcing a failure. [ 181.832019][T13944] name failslab, interval 1, probability 0, space 0, times 0 [ 181.852530][T13944] CPU: 0 PID: 13944 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 181.860203][T13944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.870265][T13944] Call Trace: [ 181.873593][T13944] dump_stack+0x172/0x1f0 [ 181.877939][T13944] should_fail.cold+0xa/0x15 [ 181.882620][T13944] ? find_held_lock+0x35/0x130 [ 181.887390][T13944] ? fault_create_debugfs_attr+0x180/0x180 [ 181.893202][T13944] ? ___might_sleep+0x163/0x280 [ 181.898064][T13944] __should_failslab+0x121/0x190 [ 181.903036][T13944] should_failslab+0x9/0x14 [ 181.907553][T13944] kmem_cache_alloc+0x2aa/0x710 [ 181.912401][T13944] ? __put_user_ns+0x70/0x70 [ 181.916996][T13944] security_inode_alloc+0x39/0x160 [ 181.922108][T13944] inode_init_always+0x56e/0xb50 [ 181.927040][T13944] ? group_pin_kill+0x1c0/0x1c0 [ 181.931909][T13944] alloc_inode+0x89/0x1e0 [ 181.936258][T13944] new_inode_pseudo+0x19/0xf0 [ 181.940940][T13944] __ns_get_path.isra.0+0x13c/0x770 [ 181.946140][T13944] ? group_pin_kill+0x1c0/0x1c0 [ 181.950984][T13944] ns_get_path_cb+0x33/0x70 [ 181.955489][T13944] ns_get_path+0x81/0xb0 [ 181.959733][T13944] ? ns_get_path_cb+0x70/0x70 [ 181.964414][T13944] ? do_raw_spin_unlock+0x57/0x270 [ 181.969542][T13944] ? _raw_spin_unlock+0x2d/0x50 [ 181.974397][T13944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.980638][T13944] proc_ns_get_link+0x170/0x1b0 [ 181.985491][T13944] ? proc_ns_readlink+0x240/0x240 [ 181.990523][T13944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.996771][T13944] ? security_inode_follow_link+0xe4/0x120 [ 182.002579][T13944] trailing_symlink+0x785/0x990 [ 182.007429][T13944] ? proc_ns_readlink+0x240/0x240 [ 182.012458][T13944] path_openat+0xa95/0x46d0 [ 182.016993][T13944] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 182.022796][T13944] ? kasan_slab_alloc+0xf/0x20 [ 182.027552][T13944] ? kmem_cache_alloc+0x121/0x710 [ 182.032575][T13944] ? getname_flags+0xd6/0x5b0 [ 182.037442][T13944] ? getname+0x1a/0x20 [ 182.041508][T13944] ? do_sys_open+0x2c9/0x5d0 [ 182.046142][T13944] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 182.051616][T13944] ? __alloc_fd+0x487/0x620 [ 182.056133][T13944] do_filp_open+0x1a1/0x280 [ 182.060653][T13944] ? may_open_dev+0x100/0x100 [ 182.065429][T13944] ? do_raw_spin_unlock+0x57/0x270 [ 182.070553][T13944] ? _raw_spin_unlock+0x2d/0x50 [ 182.075417][T13944] do_sys_open+0x3fe/0x5d0 [ 182.079834][T13944] ? filp_open+0x80/0x80 [ 182.084094][T13944] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 182.089575][T13944] ? do_syscall_64+0x26/0x6a0 [ 182.094519][T13944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.100590][T13944] ? do_syscall_64+0x26/0x6a0 [ 182.105285][T13944] __x64_sys_open+0x7e/0xc0 [ 182.109884][T13944] do_syscall_64+0xfd/0x6a0 [ 182.114485][T13944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.120470][T13944] RIP: 0033:0x413701 [ 182.124366][T13944] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 182.144147][T13944] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 182.152736][T13944] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 182.160711][T13944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 182.168703][T13944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.176668][T13944] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 182.184641][T13944] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 182.222545][T13900] XFS (loop1): log mount failed 23:28:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:28:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:31 executing program 5 (fault-call:0 fault-nth:13): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:31 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfcfdffff00000000) 23:28:31 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:31 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfeffffff00000000) 23:28:31 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 182.711004][T13957] XFS (loop0): Invalid superblock magic number [ 182.745090][T13970] FAULT_INJECTION: forcing a failure. [ 182.745090][T13970] name failslab, interval 1, probability 0, space 0, times 0 [ 182.816825][T13970] CPU: 1 PID: 13970 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 182.824510][T13970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.834580][T13970] Call Trace: [ 182.837916][T13970] dump_stack+0x172/0x1f0 [ 182.842284][T13970] should_fail.cold+0xa/0x15 [ 182.846925][T13970] ? fault_create_debugfs_attr+0x180/0x180 [ 182.852778][T13970] ? ___might_sleep+0x163/0x280 [ 182.857649][T13970] __should_failslab+0x121/0x190 [ 182.862607][T13970] should_failslab+0x9/0x14 [ 182.867131][T13970] kmem_cache_alloc+0x2aa/0x710 [ 182.871998][T13970] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 182.877897][T13970] ? rwlock_bug.part.0+0x90/0x90 [ 182.882855][T13970] __d_alloc+0x2e/0x8c0 [ 182.887034][T13970] d_alloc_anon+0x18/0x20 [ 182.891375][T13970] __ns_get_path.isra.0+0x308/0x770 [ 182.896594][T13970] ? group_pin_kill+0x1c0/0x1c0 [ 182.901457][T13970] ns_get_path_cb+0x33/0x70 [ 182.906020][T13970] ns_get_path+0x81/0xb0 [ 182.910295][T13970] ? ns_get_path_cb+0x70/0x70 23:28:31 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xff00000000000000) [ 182.914991][T13970] ? do_raw_spin_unlock+0x57/0x270 [ 182.915014][T13970] ? _raw_spin_unlock+0x2d/0x50 [ 182.915033][T13970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.915054][T13970] proc_ns_get_link+0x170/0x1b0 [ 182.915076][T13970] ? proc_ns_readlink+0x240/0x240 [ 182.931285][T13970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.931304][T13970] ? security_inode_follow_link+0xe4/0x120 [ 182.931323][T13970] trailing_symlink+0x785/0x990 [ 182.931345][T13970] ? proc_ns_readlink+0x240/0x240 [ 182.963154][T13970] path_openat+0xa95/0x46d0 [ 182.967678][T13970] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 182.973683][T13970] ? kasan_slab_alloc+0xf/0x20 [ 182.973699][T13970] ? kmem_cache_alloc+0x121/0x710 [ 182.973714][T13970] ? getname_flags+0xd6/0x5b0 [ 182.973727][T13970] ? getname+0x1a/0x20 [ 182.973743][T13970] ? do_sys_open+0x2c9/0x5d0 [ 182.973770][T13970] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 182.973793][T13970] ? __alloc_fd+0x487/0x620 [ 182.973813][T13970] do_filp_open+0x1a1/0x280 [ 182.973829][T13970] ? may_open_dev+0x100/0x100 [ 182.973864][T13970] ? do_raw_spin_unlock+0x57/0x270 [ 182.983674][T13970] ? _raw_spin_unlock+0x2d/0x50 [ 182.983710][T13970] do_sys_open+0x3fe/0x5d0 [ 182.983730][T13970] ? filp_open+0x80/0x80 [ 182.983749][T13970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 182.983764][T13970] ? do_syscall_64+0x26/0x6a0 [ 182.983778][T13970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.983791][T13970] ? do_syscall_64+0x26/0x6a0 [ 182.983811][T13970] __x64_sys_open+0x7e/0xc0 [ 182.983829][T13970] do_syscall_64+0xfd/0x6a0 [ 182.983847][T13970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.983859][T13970] RIP: 0033:0x413701 [ 182.983875][T13970] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 182.983891][T13970] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 183.103351][T13970] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 183.111436][T13970] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 183.119419][T13970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 183.127405][T13970] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 183.135397][T13970] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:31 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:31 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xffffffff00000000) 23:28:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:32 executing program 5 (fault-call:0 fault-nth:14): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:32 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:28:32 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xc0002, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) [ 183.647441][T14017] FAULT_INJECTION: forcing a failure. [ 183.647441][T14017] name failslab, interval 1, probability 0, space 0, times 0 23:28:32 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 183.707781][T14017] CPU: 1 PID: 14017 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 183.715463][T14017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.725540][T14017] Call Trace: [ 183.728852][T14017] dump_stack+0x172/0x1f0 [ 183.733211][T14017] should_fail.cold+0xa/0x15 [ 183.737832][T14017] ? fault_create_debugfs_attr+0x180/0x180 [ 183.743664][T14017] ? ___might_sleep+0x163/0x280 [ 183.748539][T14017] __should_failslab+0x121/0x190 [ 183.753494][T14017] should_failslab+0x9/0x14 [ 183.758025][T14017] kmem_cache_alloc+0x2aa/0x710 [ 183.762976][T14017] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 183.768865][T14017] ? rwlock_bug.part.0+0x90/0x90 [ 183.773805][T14017] __d_alloc+0x2e/0x8c0 [ 183.777968][T14017] d_alloc_anon+0x18/0x20 [ 183.782283][T14017] __ns_get_path.isra.0+0x308/0x770 [ 183.787519][T14017] ? group_pin_kill+0x1c0/0x1c0 [ 183.792409][T14017] ns_get_path_cb+0x33/0x70 [ 183.796929][T14017] ns_get_path+0x81/0xb0 [ 183.801162][T14017] ? ns_get_path_cb+0x70/0x70 [ 183.805833][T14017] ? do_raw_spin_unlock+0x57/0x270 [ 183.810968][T14017] ? _raw_spin_unlock+0x2d/0x50 [ 183.815843][T14017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 183.822310][T14017] proc_ns_get_link+0x170/0x1b0 [ 183.827166][T14017] ? proc_ns_readlink+0x240/0x240 [ 183.832180][T14017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 183.838407][T14017] ? security_inode_follow_link+0xe4/0x120 [ 183.844201][T14017] trailing_symlink+0x785/0x990 [ 183.849038][T14017] ? proc_ns_readlink+0x240/0x240 [ 183.854058][T14017] path_openat+0xa95/0x46d0 [ 183.858563][T14017] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 183.864365][T14017] ? kasan_slab_alloc+0xf/0x20 [ 183.869129][T14017] ? kmem_cache_alloc+0x121/0x710 [ 183.874136][T14017] ? getname_flags+0xd6/0x5b0 [ 183.878791][T14017] ? getname+0x1a/0x20 [ 183.882852][T14017] ? do_sys_open+0x2c9/0x5d0 [ 183.887437][T14017] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 183.892811][T14017] ? __alloc_fd+0x487/0x620 [ 183.897322][T14017] do_filp_open+0x1a1/0x280 [ 183.901813][T14017] ? may_open_dev+0x100/0x100 [ 183.906492][T14017] ? do_raw_spin_unlock+0x57/0x270 [ 183.911605][T14017] ? _raw_spin_unlock+0x2d/0x50 [ 183.916458][T14017] do_sys_open+0x3fe/0x5d0 [ 183.920877][T14017] ? filp_open+0x80/0x80 [ 183.925138][T14017] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 183.930580][T14017] ? do_syscall_64+0x26/0x6a0 [ 183.935241][T14017] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.941293][T14017] ? do_syscall_64+0x26/0x6a0 [ 183.945973][T14017] __x64_sys_open+0x7e/0xc0 [ 183.950508][T14017] do_syscall_64+0xfd/0x6a0 [ 183.955015][T14017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.960906][T14017] RIP: 0033:0x413701 [ 183.964798][T14017] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 183.984390][T14017] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 183.992805][T14017] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 184.000797][T14017] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce 23:28:32 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7, r0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x652842, 0x0) signalfd(r1, &(0x7f0000000080)={0xffff}, 0x8) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) [ 184.009012][T14017] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.016976][T14017] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 184.024942][T14017] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:32 executing program 5 (fault-call:0 fault-nth:15): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:32 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:32 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/96) [ 184.264547][T14042] FAULT_INJECTION: forcing a failure. [ 184.264547][T14042] name failslab, interval 1, probability 0, space 0, times 0 [ 184.280132][T14042] CPU: 1 PID: 14042 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 184.287791][T14042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.297862][T14042] Call Trace: [ 184.301177][T14042] dump_stack+0x172/0x1f0 [ 184.305536][T14042] should_fail.cold+0xa/0x15 [ 184.310161][T14042] ? fault_create_debugfs_attr+0x180/0x180 [ 184.315990][T14042] ? ___might_sleep+0x163/0x280 [ 184.320863][T14042] __should_failslab+0x121/0x190 [ 184.325821][T14042] should_failslab+0x9/0x14 [ 184.330328][T14042] __kmalloc+0x2e0/0x780 [ 184.334648][T14042] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 184.340367][T14042] ? rcu_read_lock_sched_held+0x110/0x130 [ 184.346101][T14042] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 184.351835][T14042] tomoyo_realpath_from_path+0xcd/0x7b0 [ 184.357399][T14042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 184.363644][T14042] tomoyo_check_open_permission+0x2a8/0x3f0 [ 184.369521][T14042] ? tomoyo_path_number_perm+0x520/0x520 [ 184.375148][T14042] ? ___might_sleep+0x163/0x280 [ 184.380001][T14042] ? inode_has_perm+0x230/0x230 [ 184.384855][T14042] ? rwlock_bug.part.0+0xc/0x90 [ 184.389710][T14042] tomoyo_file_open+0xa9/0xd0 [ 184.394370][T14042] security_file_open+0x71/0x300 [ 184.399297][T14042] do_dentry_open+0x373/0x1250 [ 184.404066][T14042] ? chown_common+0x5c0/0x5c0 [ 184.408744][T14042] ? inode_permission+0xb4/0x560 [ 184.413686][T14042] vfs_open+0xa0/0xd0 [ 184.417652][T14042] path_openat+0x10e9/0x46d0 [ 184.422223][T14042] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 184.428012][T14042] ? kasan_slab_alloc+0xf/0x20 [ 184.432773][T14042] ? kmem_cache_alloc+0x121/0x710 [ 184.437817][T14042] ? getname_flags+0xd6/0x5b0 [ 184.442649][T14042] ? getname+0x1a/0x20 [ 184.446710][T14042] ? do_sys_open+0x2c9/0x5d0 [ 184.451345][T14042] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 184.456749][T14042] ? __alloc_fd+0x487/0x620 [ 184.461248][T14042] do_filp_open+0x1a1/0x280 [ 184.465756][T14042] ? may_open_dev+0x100/0x100 [ 184.470434][T14042] ? do_raw_spin_unlock+0x57/0x270 [ 184.475537][T14042] ? _raw_spin_unlock+0x2d/0x50 [ 184.480388][T14042] do_sys_open+0x3fe/0x5d0 [ 184.484816][T14042] ? filp_open+0x80/0x80 [ 184.489100][T14042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 184.494577][T14042] ? do_syscall_64+0x26/0x6a0 [ 184.499247][T14042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.505344][T14042] ? do_syscall_64+0x26/0x6a0 [ 184.510033][T14042] __x64_sys_open+0x7e/0xc0 [ 184.514537][T14042] do_syscall_64+0xfd/0x6a0 [ 184.519141][T14042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.525018][T14042] RIP: 0033:0x413701 [ 184.528918][T14042] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 184.548597][T14042] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 184.557153][T14042] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 23:28:33 executing program 5 (fault-call:0 fault-nth:16): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 184.565226][T14042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 184.573346][T14042] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.581309][T14042] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 184.589345][T14042] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 184.599881][T14042] ERROR: Out of memory at tomoyo_realpath_from_path. 23:28:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:33 executing program 2: syz_init_net_socket$ax25(0x3, 0x7, 0x0) 23:28:33 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 184.820862][T14041] XFS (loop0): Invalid superblock magic number [ 184.849291][T14064] FAULT_INJECTION: forcing a failure. [ 184.849291][T14064] name failslab, interval 1, probability 0, space 0, times 0 [ 184.985623][T14064] CPU: 1 PID: 14064 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 184.993297][T14064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.003365][T14064] Call Trace: [ 185.006683][T14064] dump_stack+0x172/0x1f0 [ 185.011042][T14064] should_fail.cold+0xa/0x15 [ 185.015667][T14064] ? fault_create_debugfs_attr+0x180/0x180 [ 185.021500][T14064] ? ___might_sleep+0x163/0x280 [ 185.026548][T14064] __should_failslab+0x121/0x190 [ 185.031777][T14064] should_failslab+0x9/0x14 [ 185.036472][T14064] __kmalloc+0x2e0/0x780 [ 185.040737][T14064] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 185.046463][T14064] ? rcu_read_lock_sched_held+0x110/0x130 [ 185.052187][T14064] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 185.058012][T14064] tomoyo_realpath_from_path+0xcd/0x7b0 [ 185.063568][T14064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.070307][T14064] tomoyo_check_open_permission+0x2a8/0x3f0 [ 185.076199][T14064] ? tomoyo_path_number_perm+0x520/0x520 [ 185.081847][T14064] ? ___might_sleep+0x163/0x280 [ 185.086722][T14064] ? inode_has_perm+0x230/0x230 [ 185.091571][T14064] ? rwlock_bug.part.0+0xc/0x90 [ 185.096430][T14064] tomoyo_file_open+0xa9/0xd0 [ 185.101116][T14064] security_file_open+0x71/0x300 [ 185.106245][T14064] do_dentry_open+0x373/0x1250 [ 185.111021][T14064] ? chown_common+0x5c0/0x5c0 [ 185.115703][T14064] ? inode_permission+0xb4/0x560 [ 185.120644][T14064] vfs_open+0xa0/0xd0 [ 185.124627][T14064] path_openat+0x10e9/0x46d0 [ 185.129217][T14064] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 185.135017][T14064] ? kasan_slab_alloc+0xf/0x20 [ 185.139782][T14064] ? kmem_cache_alloc+0x121/0x710 [ 185.144805][T14064] ? getname_flags+0xd6/0x5b0 [ 185.149479][T14064] ? getname+0x1a/0x20 [ 185.153548][T14064] ? do_sys_open+0x2c9/0x5d0 [ 185.158150][T14064] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 185.163533][T14064] ? __alloc_fd+0x487/0x620 [ 185.168046][T14064] do_filp_open+0x1a1/0x280 [ 185.172642][T14064] ? may_open_dev+0x100/0x100 [ 185.178802][T14064] ? do_raw_spin_unlock+0x57/0x270 [ 185.183922][T14064] ? _raw_spin_unlock+0x2d/0x50 [ 185.188792][T14064] do_sys_open+0x3fe/0x5d0 [ 185.193215][T14064] ? filp_open+0x80/0x80 [ 185.197617][T14064] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.203163][T14064] ? do_syscall_64+0x26/0x6a0 [ 185.207843][T14064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.213908][T14064] ? do_syscall_64+0x26/0x6a0 [ 185.218591][T14064] __x64_sys_open+0x7e/0xc0 [ 185.223106][T14064] do_syscall_64+0xfd/0x6a0 [ 185.227614][T14064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.233511][T14064] RIP: 0033:0x413701 [ 185.237425][T14064] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 185.257037][T14064] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 185.265551][T14064] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 185.273526][T14064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 185.281500][T14064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.289571][T14064] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 185.297547][T14064] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 185.308786][T14064] ERROR: Out of memory at tomoyo_realpath_from_path. 23:28:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:28:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:34 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0xf1) syz_init_net_socket$ax25(0x3, 0x2, 0x1800000000000) 23:28:34 executing program 5 (fault-call:0 fault-nth:17): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:34 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 185.609924][T14090] FAULT_INJECTION: forcing a failure. [ 185.609924][T14090] name failslab, interval 1, probability 0, space 0, times 0 [ 185.635718][T14090] CPU: 1 PID: 14090 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 185.643486][T14090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.653551][T14090] Call Trace: 23:28:34 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)=""/4096) [ 185.656859][T14090] dump_stack+0x172/0x1f0 [ 185.661211][T14090] should_fail.cold+0xa/0x15 [ 185.665836][T14090] ? fault_create_debugfs_attr+0x180/0x180 [ 185.671663][T14090] ? ___might_sleep+0x163/0x280 [ 185.676529][T14090] __should_failslab+0x121/0x190 [ 185.681488][T14090] should_failslab+0x9/0x14 [ 185.686004][T14090] __kmalloc+0x2e0/0x780 [ 185.690278][T14090] ? tomoyo_encode2.part.0+0xf5/0x400 [ 185.695667][T14090] tomoyo_encode2.part.0+0xf5/0x400 [ 185.695691][T14090] tomoyo_encode+0x2b/0x50 [ 185.695708][T14090] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 185.695733][T14090] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.705608][T14090] tomoyo_check_open_permission+0x2a8/0x3f0 [ 185.705629][T14090] ? tomoyo_path_number_perm+0x520/0x520 [ 185.705658][T14090] ? ___might_sleep+0x163/0x280 [ 185.705694][T14090] ? inode_has_perm+0x230/0x230 [ 185.705709][T14090] ? rwlock_bug.part.0+0xc/0x90 [ 185.705731][T14090] tomoyo_file_open+0xa9/0xd0 [ 185.705747][T14090] security_file_open+0x71/0x300 [ 185.705780][T14090] do_dentry_open+0x373/0x1250 [ 185.729170][T14090] ? chown_common+0x5c0/0x5c0 [ 185.762886][T14090] ? inode_permission+0xb4/0x560 [ 185.767849][T14090] vfs_open+0xa0/0xd0 [ 185.771860][T14090] path_openat+0x10e9/0x46d0 [ 185.776497][T14090] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 185.782323][T14090] ? kasan_slab_alloc+0xf/0x20 [ 185.787188][T14090] ? kmem_cache_alloc+0x121/0x710 [ 185.792235][T14090] ? getname_flags+0xd6/0x5b0 [ 185.796926][T14090] ? getname+0x1a/0x20 [ 185.796943][T14090] ? do_sys_open+0x2c9/0x5d0 [ 185.796981][T14090] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 185.811031][T14090] ? __alloc_fd+0x487/0x620 [ 185.815555][T14090] do_filp_open+0x1a1/0x280 [ 185.820077][T14090] ? may_open_dev+0x100/0x100 [ 185.824780][T14090] ? do_raw_spin_unlock+0x57/0x270 [ 185.830000][T14090] ? _raw_spin_unlock+0x2d/0x50 [ 185.834889][T14090] do_sys_open+0x3fe/0x5d0 [ 185.839323][T14090] ? filp_open+0x80/0x80 [ 185.843587][T14090] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.849060][T14090] ? do_syscall_64+0x26/0x6a0 [ 185.853752][T14090] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.859833][T14090] ? do_syscall_64+0x26/0x6a0 [ 185.864528][T14090] __x64_sys_open+0x7e/0xc0 [ 185.869057][T14090] do_syscall_64+0xfd/0x6a0 [ 185.873576][T14090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.879479][T14090] RIP: 0033:0x413701 [ 185.883392][T14090] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 23:28:34 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x4000000000) [ 185.903217][T14090] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 185.911652][T14090] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 185.919648][T14090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 185.927633][T14090] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.935620][T14090] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 185.943593][T14090] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:34 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 185.962526][T14090] ERROR: Out of memory at tomoyo_realpath_from_path. [ 186.065497][T14102] XFS (loop0): Invalid superblock magic number 23:28:34 executing program 5 (fault-call:0 fault-nth:18): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:34 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:34 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x40) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000000c0)={r0, r0, 0x101, 0x74, &(0x7f0000000040)="adca09f405cd1f38487ef4fa749fdc63996a856f17e28f5d094f968addc3ff3aeb8a776f95c6b39ddb7649255a6a264d7e8118eab01df636021b3ab80c82a4821d91741b6578350c34eced0ac2fe1082dde09008d5a25f9344c2a60bb2322742d194b8e654c60b5c409974d16a5680eefccde7bc", 0x3, 0x8001, 0x4, 0x303b900b, 0x101, 0x3, 0x6, 'syz0\x00'}) [ 186.432795][T14126] FAULT_INJECTION: forcing a failure. [ 186.432795][T14126] name failslab, interval 1, probability 0, space 0, times 0 [ 186.445830][T14126] CPU: 0 PID: 14126 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 186.453481][T14126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.463539][T14126] Call Trace: [ 186.466837][T14126] dump_stack+0x172/0x1f0 [ 186.471181][T14126] should_fail.cold+0xa/0x15 [ 186.475781][T14126] ? fault_create_debugfs_attr+0x180/0x180 [ 186.482462][T14126] ? ___might_sleep+0x163/0x280 [ 186.487319][T14126] __should_failslab+0x121/0x190 [ 186.492354][T14126] should_failslab+0x9/0x14 [ 186.497390][T14126] __kmalloc+0x2e0/0x780 [ 186.501910][T14126] ? tomoyo_encode2.part.0+0xf5/0x400 [ 186.507293][T14126] tomoyo_encode2.part.0+0xf5/0x400 [ 186.512503][T14126] tomoyo_encode+0x2b/0x50 [ 186.517047][T14126] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 186.522680][T14126] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 186.528923][T14126] tomoyo_check_open_permission+0x2a8/0x3f0 [ 186.534820][T14126] ? tomoyo_path_number_perm+0x520/0x520 [ 186.540466][T14126] ? ___might_sleep+0x163/0x280 [ 186.545336][T14126] ? inode_has_perm+0x230/0x230 [ 186.550186][T14126] ? rwlock_bug.part.0+0xc/0x90 [ 186.555048][T14126] tomoyo_file_open+0xa9/0xd0 [ 186.559724][T14126] security_file_open+0x71/0x300 [ 186.564665][T14126] do_dentry_open+0x373/0x1250 [ 186.569435][T14126] ? chown_common+0x5c0/0x5c0 [ 186.574111][T14126] ? inode_permission+0xb4/0x560 [ 186.579049][T14126] vfs_open+0xa0/0xd0 [ 186.583030][T14126] path_openat+0x10e9/0x46d0 [ 186.587613][T14126] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 186.593420][T14126] ? kasan_slab_alloc+0xf/0x20 [ 186.598265][T14126] ? kmem_cache_alloc+0x121/0x710 [ 186.603287][T14126] ? getname_flags+0xd6/0x5b0 [ 186.607957][T14126] ? getname+0x1a/0x20 [ 186.612022][T14126] ? do_sys_open+0x2c9/0x5d0 [ 186.616731][T14126] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 186.622111][T14126] ? __alloc_fd+0x487/0x620 [ 186.626614][T14126] do_filp_open+0x1a1/0x280 [ 186.631118][T14126] ? may_open_dev+0x100/0x100 [ 186.635827][T14126] ? do_raw_spin_unlock+0x57/0x270 [ 186.640955][T14126] ? _raw_spin_unlock+0x2d/0x50 [ 186.645958][T14126] do_sys_open+0x3fe/0x5d0 [ 186.650391][T14126] ? filp_open+0x80/0x80 [ 186.654639][T14126] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.660092][T14126] ? do_syscall_64+0x26/0x6a0 [ 186.664768][T14126] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.670827][T14126] ? do_syscall_64+0x26/0x6a0 [ 186.675600][T14126] __x64_sys_open+0x7e/0xc0 [ 186.680106][T14126] do_syscall_64+0xfd/0x6a0 [ 186.684610][T14126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.690494][T14126] RIP: 0033:0x413701 [ 186.694387][T14126] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 186.714341][T14126] RSP: 002b:00007fa7d6b10c10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 186.722748][T14126] RAX: ffffffffffffffda RBX: 00007fa7d6b10c90 RCX: 0000000000413701 [ 186.730732][T14126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004be3ce [ 186.738701][T14126] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.746665][T14126] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fa7d6b116d4 [ 186.754642][T14126] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 186.778229][T14126] ERROR: Out of memory at tomoyo_realpath_from_path. 23:28:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:28:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x80000, 0x2) accept4$ax25(r0, &(0x7f0000000080)={{0x3, @bcast}, [@default, @bcast, @netrom, @default, @remote, @bcast, @default, @netrom]}, &(0x7f0000000100)=0x48, 0x800) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0xc0e, 0x30314142, 0x5, 0x7, 0x3, @stepwise={{0x400, 0x7ff}, {0x4, 0x2}, {0x4, 0x5}}}) syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="88065c7d3fb16f5e685c3eb9423b38e024fda666a72a0bf59a44b45c1b95619ec19f76321375501e58b5f5fd30a12cab5db3a354ed2f3ce620", 0x39) accept4$netrom(r0, &(0x7f0000000180)={{}, [@null, @null, @bcast, @default, @remote, @default, @remote, @netrom]}, &(0x7f0000000200)=0x48, 0x800) 23:28:35 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:35 executing program 5 (fault-call:0 fault-nth:19): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 186.985488][T14146] FAULT_INJECTION: forcing a failure. [ 186.985488][T14146] name failslab, interval 1, probability 0, space 0, times 0 [ 186.998459][T14146] CPU: 0 PID: 14146 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 187.006191][T14146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.016255][T14146] Call Trace: [ 187.019564][T14146] dump_stack+0x172/0x1f0 [ 187.023927][T14146] should_fail.cold+0xa/0x15 [ 187.028540][T14146] ? fault_create_debugfs_attr+0x180/0x180 [ 187.034365][T14146] __should_failslab+0x121/0x190 [ 187.039324][T14146] should_failslab+0x9/0x14 [ 187.043843][T14146] kmem_cache_alloc+0x47/0x710 [ 187.048623][T14146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.054881][T14146] ebitmap_cpy+0xcd/0x270 [ 187.059223][T14146] ? hashtab_search+0x1b9/0x250 [ 187.064094][T14146] mls_compute_sid+0x5d0/0xf60 [ 187.068882][T14146] ? mls_convert_context+0x6d0/0x6d0 [ 187.075712][T14146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.075727][T14146] ? sidtab_search_core+0x164/0x210 [ 187.075744][T14146] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 187.075775][T14146] security_compute_sid.part.0+0xafd/0x1600 [ 187.075805][T14146] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 187.075826][T14146] ? __kasan_check_read+0x11/0x20 [ 187.087265][T14146] ? avc_has_perm_noaudit+0x3b8/0x570 [ 187.087305][T14146] security_transition_sid+0x126/0x190 [ 187.087329][T14146] selinux_socket_create+0x453/0x610 [ 187.087348][T14146] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 187.087366][T14146] ? switch_task_namespaces+0x6c/0xd0 [ 187.087389][T14146] security_socket_create+0x7b/0xc0 [ 187.099073][T14146] __sock_create+0x90/0x730 [ 187.116125][T14146] ? lock_downgrade+0x920/0x920 [ 187.116151][T14146] __sys_socket+0x103/0x220 [ 187.116169][T14146] ? move_addr_to_kernel+0x80/0x80 [ 187.116188][T14146] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 187.116204][T14146] ? do_syscall_64+0x26/0x6a0 [ 187.116220][T14146] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.116234][T14146] ? do_syscall_64+0x26/0x6a0 23:28:35 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, r1, 0x8, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x1, 0x9, 0x3]}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="44ea9b8abd8a82e3c546529abea4dea3"}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xfd}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x2b}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}]}, 0x98}, 0x1, 0x0, 0x0, 0x8084}, 0x80) 23:28:35 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 187.116257][T14146] __x64_sys_socket+0x73/0xb0 [ 187.188876][T14146] do_syscall_64+0xfd/0x6a0 [ 187.193398][T14146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.199297][T14146] RIP: 0033:0x459819 [ 187.203201][T14146] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.222823][T14146] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 23:28:35 executing program 5 (fault-call:0 fault-nth:20): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 187.231218][T14146] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 187.239219][T14146] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 187.247296][T14146] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.255404][T14146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 187.263384][T14146] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 187.404053][T14162] FAULT_INJECTION: forcing a failure. [ 187.404053][T14162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 187.417300][T14162] CPU: 0 PID: 14162 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 187.424939][T14162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.435004][T14162] Call Trace: [ 187.438395][T14162] dump_stack+0x172/0x1f0 [ 187.442834][T14162] should_fail.cold+0xa/0x15 [ 187.447438][T14162] ? mark_lock+0xc0/0x11e0 [ 187.451868][T14162] ? fault_create_debugfs_attr+0x180/0x180 [ 187.457682][T14162] ? rcu_read_unlock+0x16/0x60 [ 187.462459][T14162] ? find_held_lock+0x35/0x130 [ 187.467246][T14162] should_fail_alloc_page+0x50/0x60 [ 187.472451][T14162] __alloc_pages_nodemask+0x1a1/0x900 [ 187.477837][T14162] ? lock_downgrade+0x920/0x920 [ 187.482706][T14162] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 187.488439][T14162] ? rcu_read_unlock+0x33/0x60 [ 187.493209][T14162] cache_grow_begin+0x90/0xd20 [ 187.497988][T14162] ? sock_alloc_inode+0x1c/0x1d0 [ 187.502941][T14162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.509193][T14162] kmem_cache_alloc+0x650/0x710 [ 187.514057][T14162] ? sock_free_inode+0x30/0x30 [ 187.518832][T14162] sock_alloc_inode+0x1c/0x1d0 [ 187.523579][T14162] alloc_inode+0x68/0x1e0 [ 187.527905][T14162] new_inode_pseudo+0x19/0xf0 [ 187.532567][T14162] sock_alloc+0x41/0x270 [ 187.536788][T14162] __sock_create+0xc2/0x730 [ 187.541290][T14162] ? lock_downgrade+0x920/0x920 [ 187.546127][T14162] __sys_socket+0x103/0x220 [ 187.550613][T14162] ? move_addr_to_kernel+0x80/0x80 [ 187.555708][T14162] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 187.561147][T14162] ? do_syscall_64+0x26/0x6a0 [ 187.565807][T14162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.571863][T14162] ? do_syscall_64+0x26/0x6a0 [ 187.576538][T14162] __x64_sys_socket+0x73/0xb0 [ 187.581200][T14162] do_syscall_64+0xfd/0x6a0 [ 187.585693][T14162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.591563][T14162] RIP: 0033:0x459819 [ 187.595441][T14162] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.615030][T14162] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 187.623431][T14162] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 187.631404][T14162] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 187.639457][T14162] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:28:36 executing program 2: syz_init_net_socket$ax25(0x3, 0x8, 0x0) 23:28:36 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 187.647420][T14162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 187.655378][T14162] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:36 executing program 5 (fault-call:0 fault-nth:21): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 187.777742][T14156] XFS (loop0): Invalid superblock magic number [ 187.961778][T14189] FAULT_INJECTION: forcing a failure. [ 187.961778][T14189] name failslab, interval 1, probability 0, space 0, times 0 [ 187.974654][T14189] CPU: 1 PID: 14189 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 187.982302][T14189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.992380][T14189] Call Trace: [ 187.995686][T14189] dump_stack+0x172/0x1f0 [ 188.000132][T14189] should_fail.cold+0xa/0x15 [ 188.004731][T14189] ? fault_create_debugfs_attr+0x180/0x180 [ 188.010548][T14189] __should_failslab+0x121/0x190 [ 188.015487][T14189] should_failslab+0x9/0x14 [ 188.019987][T14189] kmem_cache_alloc+0x47/0x710 [ 188.024838][T14189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.031090][T14189] ebitmap_cpy+0xcd/0x270 [ 188.035417][T14189] ? hashtab_search+0x1b9/0x250 [ 188.040278][T14189] mls_compute_sid+0x5d0/0xf60 [ 188.045049][T14189] ? mls_convert_context+0x6d0/0x6d0 [ 188.050341][T14189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.056582][T14189] ? sidtab_search_core+0x164/0x210 [ 188.061805][T14189] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 188.067532][T14189] security_compute_sid.part.0+0xafd/0x1600 [ 188.073439][T14189] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 188.080106][T14189] ? __kasan_check_read+0x11/0x20 [ 188.085133][T14189] ? avc_has_perm_noaudit+0x3b8/0x570 [ 188.090516][T14189] security_transition_sid+0x126/0x190 [ 188.095979][T14189] selinux_socket_create+0x453/0x610 [ 188.101258][T14189] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 188.107152][T14189] ? switch_task_namespaces+0x6c/0xd0 [ 188.112526][T14189] security_socket_create+0x7b/0xc0 [ 188.117722][T14189] __sock_create+0x90/0x730 [ 188.122219][T14189] ? lock_downgrade+0x920/0x920 [ 188.127091][T14189] __sys_socket+0x103/0x220 [ 188.131592][T14189] ? move_addr_to_kernel+0x80/0x80 [ 188.136698][T14189] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.142158][T14189] ? do_syscall_64+0x26/0x6a0 [ 188.146848][T14189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.152910][T14189] ? do_syscall_64+0x26/0x6a0 [ 188.157598][T14189] __x64_sys_socket+0x73/0xb0 [ 188.162279][T14189] do_syscall_64+0xfd/0x6a0 [ 188.166784][T14189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.172672][T14189] RIP: 0033:0x459819 [ 188.176570][T14189] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.196189][T14189] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 188.204605][T14189] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 188.212572][T14189] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 188.220537][T14189] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.228592][T14189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 188.236560][T14189] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:37 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:28:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:37 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:37 executing program 2: syz_init_net_socket$ax25(0x3, 0x7, 0x0) 23:28:37 executing program 5 (fault-call:0 fault-nth:22): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 188.514243][T14205] FAULT_INJECTION: forcing a failure. [ 188.514243][T14205] name failslab, interval 1, probability 0, space 0, times 0 [ 188.564739][T14205] CPU: 0 PID: 14205 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 188.572423][T14205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.582489][T14205] Call Trace: [ 188.585809][T14205] dump_stack+0x172/0x1f0 [ 188.590164][T14205] should_fail.cold+0xa/0x15 [ 188.594778][T14205] ? fault_create_debugfs_attr+0x180/0x180 [ 188.600606][T14205] ? ___might_sleep+0x163/0x280 [ 188.605488][T14205] __should_failslab+0x121/0x190 [ 188.610441][T14205] ? sock_free_inode+0x30/0x30 [ 188.615328][T14205] should_failslab+0x9/0x14 [ 188.619838][T14205] kmem_cache_alloc+0x2aa/0x710 [ 188.624674][T14205] ? selinux_socket_create+0x2b2/0x610 [ 188.630147][T14205] ? sock_free_inode+0x30/0x30 [ 188.634906][T14205] sock_alloc_inode+0x1c/0x1d0 [ 188.639754][T14205] alloc_inode+0x68/0x1e0 [ 188.644082][T14205] new_inode_pseudo+0x19/0xf0 [ 188.648768][T14205] sock_alloc+0x41/0x270 [ 188.652997][T14205] __sock_create+0xc2/0x730 [ 188.657596][T14205] ? lock_downgrade+0x920/0x920 [ 188.662437][T14205] __sys_socket+0x103/0x220 [ 188.666950][T14205] ? move_addr_to_kernel+0x80/0x80 [ 188.672062][T14205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.677791][T14205] ? do_syscall_64+0x26/0x6a0 [ 188.682571][T14205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.688808][T14205] ? do_syscall_64+0x26/0x6a0 [ 188.693475][T14205] __x64_sys_socket+0x73/0xb0 [ 188.698136][T14205] do_syscall_64+0xfd/0x6a0 [ 188.702649][T14205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.708529][T14205] RIP: 0033:0x459819 [ 188.712420][T14205] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.732384][T14205] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 188.740807][T14205] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 188.748792][T14205] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 188.756747][T14205] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:28:37 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:37 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x6, 0x1, [], &(0x7f0000000040)=0x9}) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_setparam(r2, &(0x7f0000000100)=0x8000) [ 188.764714][T14205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 188.772690][T14205] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 188.810633][T14205] socket: no more sockets 23:28:37 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:37 executing program 5 (fault-call:0 fault-nth:23): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 189.075956][T14216] XFS (loop0): Invalid superblock magic number [ 189.093399][T14237] FAULT_INJECTION: forcing a failure. [ 189.093399][T14237] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 189.106844][T14237] CPU: 1 PID: 14237 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 189.114486][T14237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.124580][T14237] Call Trace: [ 189.128089][T14237] dump_stack+0x172/0x1f0 [ 189.133075][T14237] should_fail.cold+0xa/0x15 [ 189.137689][T14237] ? mark_lock+0xc0/0x11e0 [ 189.142129][T14237] ? fault_create_debugfs_attr+0x180/0x180 [ 189.147947][T14237] ? rcu_read_unlock+0x16/0x60 [ 189.152831][T14237] ? find_held_lock+0x35/0x130 [ 189.157706][T14237] should_fail_alloc_page+0x50/0x60 [ 189.162924][T14237] __alloc_pages_nodemask+0x1a1/0x900 [ 189.168318][T14237] ? lock_downgrade+0x920/0x920 [ 189.173185][T14237] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 189.180462][T14237] ? rcu_read_unlock+0x33/0x60 [ 189.185360][T14237] cache_grow_begin+0x90/0xd20 [ 189.190141][T14237] ? sock_alloc_inode+0x1c/0x1d0 [ 189.195094][T14237] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.201540][T14237] kmem_cache_alloc+0x650/0x710 [ 189.206416][T14237] ? sock_free_inode+0x30/0x30 [ 189.211325][T14237] sock_alloc_inode+0x1c/0x1d0 [ 189.216100][T14237] alloc_inode+0x68/0x1e0 [ 189.220467][T14237] new_inode_pseudo+0x19/0xf0 23:28:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 189.225172][T14237] sock_alloc+0x41/0x270 [ 189.229437][T14237] __sock_create+0xc2/0x730 [ 189.233957][T14237] ? lock_downgrade+0x920/0x920 [ 189.238832][T14237] __sys_socket+0x103/0x220 [ 189.243435][T14237] ? move_addr_to_kernel+0x80/0x80 [ 189.248553][T14237] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.254031][T14237] ? do_syscall_64+0x26/0x6a0 [ 189.258720][T14237] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.264807][T14237] ? do_syscall_64+0x26/0x6a0 [ 189.269502][T14237] __x64_sys_socket+0x73/0xb0 [ 189.274195][T14237] do_syscall_64+0xfd/0x6a0 [ 189.278714][T14237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.284651][T14237] RIP: 0033:0x459819 [ 189.288554][T14237] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.308170][T14237] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 189.316593][T14237] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 189.324578][T14237] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 189.332561][T14237] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.340543][T14237] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 189.348524][T14237] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:38 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 23:28:38 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:38 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) flock(r0, 0x0) 23:28:38 executing program 5 (fault-call:0 fault-nth:24): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 189.715063][T14261] FAULT_INJECTION: forcing a failure. [ 189.715063][T14261] name failslab, interval 1, probability 0, space 0, times 0 23:28:38 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 189.842628][T14261] CPU: 1 PID: 14261 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 189.850303][T14261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.860380][T14261] Call Trace: [ 189.863692][T14261] dump_stack+0x172/0x1f0 [ 189.868037][T14261] should_fail.cold+0xa/0x15 [ 189.872730][T14261] ? fault_create_debugfs_attr+0x180/0x180 [ 189.878537][T14261] ? __kasan_check_read+0x11/0x20 [ 189.883589][T14261] __should_failslab+0x121/0x190 [ 189.888540][T14261] should_failslab+0x9/0x14 [ 189.893058][T14261] __kmalloc+0x71/0x780 [ 189.897223][T14261] ? find_held_lock+0x35/0x130 [ 189.901993][T14261] ? __sock_create+0x382/0x730 [ 189.906766][T14261] ? sk_prot_alloc+0x23a/0x310 [ 189.911546][T14261] sk_prot_alloc+0x23a/0x310 [ 189.916153][T14261] sk_alloc+0x39/0xf70 [ 189.920219][T14261] ax25_create+0xfc/0x310 [ 189.924540][T14261] __sock_create+0x3d8/0x730 [ 189.929114][T14261] ? lock_downgrade+0x920/0x920 [ 189.933962][T14261] __sys_socket+0x103/0x220 [ 189.938487][T14261] ? move_addr_to_kernel+0x80/0x80 [ 189.943601][T14261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.949053][T14261] ? do_syscall_64+0x26/0x6a0 [ 189.953723][T14261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.959801][T14261] ? do_syscall_64+0x26/0x6a0 [ 189.964507][T14261] __x64_sys_socket+0x73/0xb0 [ 189.969194][T14261] do_syscall_64+0xfd/0x6a0 [ 189.973713][T14261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.979698][T14261] RIP: 0033:0x459819 [ 189.983599][T14261] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.003206][T14261] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 190.011606][T14261] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 190.019572][T14261] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 190.027549][T14261] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 190.035517][T14261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 23:28:38 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x80800) [ 190.043507][T14261] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:38 executing program 5 (fault-call:0 fault-nth:25): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:38 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 190.275243][T14273] XFS (loop0): Invalid superblock magic number [ 190.337655][T14298] FAULT_INJECTION: forcing a failure. [ 190.337655][T14298] name failslab, interval 1, probability 0, space 0, times 0 [ 190.350503][T14298] CPU: 0 PID: 14298 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 190.358142][T14298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.368218][T14298] Call Trace: [ 190.371524][T14298] dump_stack+0x172/0x1f0 [ 190.375874][T14298] should_fail.cold+0xa/0x15 [ 190.380479][T14298] ? lock_downgrade+0x920/0x920 [ 190.385341][T14298] ? fault_create_debugfs_attr+0x180/0x180 [ 190.391154][T14298] ? __kasan_check_read+0x11/0x20 [ 190.396192][T14298] ? mark_lock+0xc0/0x11e0 [ 190.400628][T14298] __should_failslab+0x121/0x190 [ 190.405587][T14298] should_failslab+0x9/0x14 [ 190.410104][T14298] kmem_cache_alloc+0x47/0x710 [ 190.414884][T14298] ? unwind_get_return_address+0x61/0xa0 [ 190.420526][T14298] ? profile_setup.cold+0xbb/0xbb [ 190.425573][T14298] ebitmap_cpy+0xcd/0x270 [ 190.429915][T14298] ? hashtab_search+0x1b9/0x250 [ 190.434793][T14298] mls_compute_sid+0x5d0/0xf60 [ 190.439573][T14298] ? mls_convert_context+0x6d0/0x6d0 [ 190.444910][T14298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.451249][T14298] ? sidtab_search_core+0x164/0x210 [ 190.456452][T14298] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 190.462158][T14298] security_compute_sid.part.0+0xafd/0x1600 [ 190.468063][T14298] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 190.474722][T14298] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 190.480516][T14298] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 190.486329][T14298] ? lockdep_hardirqs_on+0x418/0x5d0 [ 190.491604][T14298] ? trace_hardirqs_on+0x67/0x240 [ 190.496611][T14298] ? __kasan_check_read+0x11/0x20 [ 190.501656][T14298] ? should_fail+0x1de/0x852 [ 190.506235][T14298] ? sk_alloc+0x5d7/0xf70 [ 190.510568][T14298] security_transition_sid+0x126/0x190 [ 190.516051][T14298] selinux_socket_post_create+0x6a6/0x880 [ 190.521757][T14298] ? selinux_bprm_set_creds+0xc90/0xc90 [ 190.527301][T14298] ? lockdep_init_map+0x1be/0x6d0 [ 190.532325][T14298] security_socket_post_create+0x83/0xd0 [ 190.537960][T14298] __sock_create+0x5b1/0x730 [ 190.542562][T14298] __sys_socket+0x103/0x220 [ 190.547313][T14298] ? move_addr_to_kernel+0x80/0x80 [ 190.552415][T14298] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 190.557862][T14298] ? do_syscall_64+0x26/0x6a0 [ 190.562522][T14298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.568573][T14298] ? do_syscall_64+0x26/0x6a0 [ 190.573271][T14298] __x64_sys_socket+0x73/0xb0 [ 190.577965][T14298] do_syscall_64+0xfd/0x6a0 [ 190.582482][T14298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.588376][T14298] RIP: 0033:0x459819 [ 190.592282][T14298] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.612532][T14298] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 190.620934][T14298] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 190.628889][T14298] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 190.636869][T14298] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 190.644831][T14298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 190.652812][T14298] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:28:39 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10200, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x200, 0x1000, 0x7, 0xec96, 0x8, 0x7, 0x0, 0xfff, 0x80, 0x1}) 23:28:39 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:39 executing program 5 (fault-call:0 fault-nth:26): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 191.067003][T14321] FAULT_INJECTION: forcing a failure. [ 191.067003][T14321] name failslab, interval 1, probability 0, space 0, times 0 [ 191.081542][T14321] CPU: 0 PID: 14321 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 191.089193][T14321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.099351][T14321] Call Trace: [ 191.102852][T14321] dump_stack+0x172/0x1f0 [ 191.107207][T14321] should_fail.cold+0xa/0x15 [ 191.111817][T14321] ? lock_downgrade+0x920/0x920 23:28:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:39 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 191.116711][T14321] ? fault_create_debugfs_attr+0x180/0x180 [ 191.122525][T14321] ? __kasan_check_read+0x11/0x20 [ 191.127561][T14321] ? mark_lock+0xc0/0x11e0 [ 191.131998][T14321] __should_failslab+0x121/0x190 [ 191.136949][T14321] should_failslab+0x9/0x14 [ 191.141462][T14321] kmem_cache_alloc+0x47/0x710 [ 191.146246][T14321] ? unwind_get_return_address+0x61/0xa0 [ 191.151892][T14321] ? profile_setup.cold+0xbb/0xbb [ 191.156935][T14321] ebitmap_cpy+0xcd/0x270 [ 191.161274][T14321] ? hashtab_search+0x1b9/0x250 23:28:39 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) syz_open_pts(r0, 0x8000) [ 191.166232][T14321] mls_compute_sid+0x5d0/0xf60 [ 191.171010][T14321] ? mls_convert_context+0x6d0/0x6d0 [ 191.176307][T14321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.183112][T14321] ? sidtab_search_core+0x164/0x210 [ 191.188323][T14321] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 191.194063][T14321] security_compute_sid.part.0+0xafd/0x1600 [ 191.199985][T14321] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 191.206662][T14321] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 191.212456][T14321] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 191.218246][T14321] ? lockdep_hardirqs_on+0x418/0x5d0 [ 191.223527][T14321] ? trace_hardirqs_on+0x67/0x240 [ 191.229664][T14321] ? __kasan_check_read+0x11/0x20 [ 191.234688][T14321] ? should_fail+0x1de/0x852 [ 191.239261][T14321] ? sk_alloc+0x5d7/0xf70 [ 191.243694][T14321] security_transition_sid+0x126/0x190 [ 191.249144][T14321] selinux_socket_post_create+0x6a6/0x880 [ 191.254895][T14321] ? selinux_bprm_set_creds+0xc90/0xc90 [ 191.260429][T14321] ? lockdep_init_map+0x1be/0x6d0 [ 191.265443][T14321] security_socket_post_create+0x83/0xd0 [ 191.271063][T14321] __sock_create+0x5b1/0x730 [ 191.275641][T14321] __sys_socket+0x103/0x220 [ 191.280150][T14321] ? move_addr_to_kernel+0x80/0x80 [ 191.285246][T14321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.290694][T14321] ? do_syscall_64+0x26/0x6a0 [ 191.295355][T14321] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.301405][T14321] ? do_syscall_64+0x26/0x6a0 [ 191.306068][T14321] __x64_sys_socket+0x73/0xb0 [ 191.310839][T14321] do_syscall_64+0xfd/0x6a0 [ 191.315348][T14321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.321239][T14321] RIP: 0033:0x459819 [ 191.325116][T14321] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.344715][T14321] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 191.353142][T14321] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 23:28:40 executing program 5 (fault-call:0 fault-nth:27): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 191.361095][T14321] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 191.369065][T14321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.377019][T14321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 191.384970][T14321] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:40 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 191.544635][T14335] FAULT_INJECTION: forcing a failure. [ 191.544635][T14335] name failslab, interval 1, probability 0, space 0, times 0 [ 191.557576][T14335] CPU: 0 PID: 14335 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 191.565330][T14335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.575397][T14335] Call Trace: [ 191.578710][T14335] dump_stack+0x172/0x1f0 [ 191.583072][T14335] should_fail.cold+0xa/0x15 [ 191.587680][T14335] ? lock_downgrade+0x920/0x920 23:28:40 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) [ 191.592557][T14335] ? fault_create_debugfs_attr+0x180/0x180 [ 191.598377][T14335] ? __kasan_check_read+0x11/0x20 [ 191.603417][T14335] ? mark_lock+0xc0/0x11e0 [ 191.607857][T14335] __should_failslab+0x121/0x190 [ 191.612816][T14335] should_failslab+0x9/0x14 [ 191.617342][T14335] kmem_cache_alloc+0x47/0x710 [ 191.622135][T14335] ? unwind_get_return_address+0x61/0xa0 [ 191.627783][T14335] ? profile_setup.cold+0xbb/0xbb [ 191.632830][T14335] ebitmap_cpy+0xcd/0x270 [ 191.637198][T14335] ? hashtab_search+0x1b9/0x250 [ 191.642063][T14335] mls_compute_sid+0x5d0/0xf60 [ 191.646859][T14335] ? mls_convert_context+0x6d0/0x6d0 [ 191.652189][T14335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.658438][T14335] ? sidtab_search_core+0x164/0x210 [ 191.658458][T14335] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 191.658483][T14335] security_compute_sid.part.0+0xafd/0x1600 [ 191.658513][T14335] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 191.658536][T14335] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 191.669443][T14335] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 191.669463][T14335] ? lockdep_hardirqs_on+0x418/0x5d0 [ 191.669480][T14335] ? trace_hardirqs_on+0x67/0x240 [ 191.669494][T14335] ? __kasan_check_read+0x11/0x20 [ 191.669520][T14335] ? should_fail+0x1de/0x852 [ 191.669543][T14335] ? sk_alloc+0x5d7/0xf70 [ 191.717990][T14335] security_transition_sid+0x126/0x190 [ 191.723476][T14335] selinux_socket_post_create+0x6a6/0x880 [ 191.729240][T14335] ? selinux_bprm_set_creds+0xc90/0xc90 [ 191.734804][T14335] ? lockdep_init_map+0x1be/0x6d0 [ 191.734829][T14335] security_socket_post_create+0x83/0xd0 [ 191.734851][T14335] __sock_create+0x5b1/0x730 [ 191.734875][T14335] __sys_socket+0x103/0x220 [ 191.734891][T14335] ? move_addr_to_kernel+0x80/0x80 [ 191.734915][T14335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.745578][T14335] ? do_syscall_64+0x26/0x6a0 [ 191.745594][T14335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.745609][T14335] ? do_syscall_64+0x26/0x6a0 [ 191.745631][T14335] __x64_sys_socket+0x73/0xb0 [ 191.745650][T14335] do_syscall_64+0xfd/0x6a0 [ 191.745668][T14335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.745680][T14335] RIP: 0033:0x459819 [ 191.745696][T14335] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.745711][T14335] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 191.780741][T14335] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 191.780751][T14335] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 191.780759][T14335] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.780775][T14335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 191.780785][T14335] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:40 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1ff, 0x800) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) [ 192.058081][T14341] XFS (loop0): Invalid superblock magic number [ 192.081927][T14364] syz-executor.2 uses old SIOCAX25GETINFO 23:28:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:28:41 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:41 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fchmodat(r0, &(0x7f0000000180)='./file0\x00', 0x40) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000000000008001, 0x1) accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x800) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000140)=r0, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000001c0)={0x9, 0x3, 0x5, 0x1f, 'syz1\x00'}) read(r0, &(0x7f0000000240)=""/24, 0x18) write$P9_RREADDIR(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x103) 23:28:41 executing program 5 (fault-call:0 fault-nth:28): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 192.549068][T14380] FAULT_INJECTION: forcing a failure. [ 192.549068][T14380] name failslab, interval 1, probability 0, space 0, times 0 [ 192.562015][T14380] CPU: 0 PID: 14380 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 192.569664][T14380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.579726][T14380] Call Trace: [ 192.583041][T14380] dump_stack+0x172/0x1f0 [ 192.587393][T14380] should_fail.cold+0xa/0x15 [ 192.592010][T14380] ? lock_downgrade+0x920/0x920 23:28:41 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 192.596884][T14380] ? fault_create_debugfs_attr+0x180/0x180 [ 192.602712][T14380] __should_failslab+0x121/0x190 [ 192.607667][T14380] should_failslab+0x9/0x14 [ 192.612186][T14380] kmem_cache_alloc+0x47/0x710 [ 192.616972][T14380] ? unwind_get_return_address+0x61/0xa0 [ 192.622621][T14380] ? profile_setup.cold+0xbb/0xbb [ 192.627666][T14380] ebitmap_cpy+0xcd/0x270 [ 192.632006][T14380] ? hashtab_search+0x1b9/0x250 [ 192.636877][T14380] mls_compute_sid+0x5d0/0xf60 [ 192.641666][T14380] ? mls_convert_context+0x6d0/0x6d0 23:28:41 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x51, 0x7, 0x2, "e900ec08452f59b2e62bf7f826361a5c29eab32a396c1f9f796b87eb782766b5", 0x32314247}) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x6}, 0x20) syz_init_net_socket$ax25(0x3, 0x4, 0xffffffffffffffff) [ 192.646971][T14380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.653309][T14380] ? sidtab_search_core+0x164/0x210 [ 192.658528][T14380] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 192.664273][T14380] security_compute_sid.part.0+0xafd/0x1600 [ 192.670193][T14380] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 192.676879][T14380] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 192.682694][T14380] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 192.688517][T14380] ? lockdep_hardirqs_on+0x418/0x5d0 [ 192.693819][T14380] ? trace_hardirqs_on+0x67/0x240 [ 192.693833][T14380] ? __kasan_check_read+0x11/0x20 [ 192.693861][T14380] ? should_fail+0x1de/0x852 [ 192.693889][T14380] security_transition_sid+0x126/0x190 [ 192.693912][T14380] selinux_socket_post_create+0x6a6/0x880 [ 192.693932][T14380] ? selinux_bprm_set_creds+0xc90/0xc90 [ 192.693957][T14380] ? lockdep_init_map+0x1be/0x6d0 [ 192.703997][T14380] security_socket_post_create+0x83/0xd0 [ 192.704021][T14380] __sock_create+0x5b1/0x730 [ 192.704045][T14380] __sys_socket+0x103/0x220 [ 192.704062][T14380] ? move_addr_to_kernel+0x80/0x80 [ 192.704078][T14380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.704094][T14380] ? do_syscall_64+0x26/0x6a0 [ 192.704107][T14380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.704128][T14380] ? do_syscall_64+0x26/0x6a0 [ 192.725601][T14380] __x64_sys_socket+0x73/0xb0 [ 192.725623][T14380] do_syscall_64+0xfd/0x6a0 [ 192.725641][T14380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.725653][T14380] RIP: 0033:0x459819 [ 192.725674][T14380] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.760622][T14380] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 192.760638][T14380] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 192.760647][T14380] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 192.760656][T14380] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:28:41 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:41 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_default\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) 23:28:41 executing program 5 (fault-call:0 fault-nth:29): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 192.760665][T14380] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 192.760674][T14380] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 192.977890][T14393] XFS (loop0): Invalid superblock magic number 23:28:41 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xcc) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0xfffffffffffffffe, 0x7, 0x1f1c00, 0x3ff, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xea\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa2\x00', 0x6}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xa9f, 0x6, 0x1, 0xff, 0x0, 0x6, 0x50, 0x2, 0xff, 0x200, 0x9, 0x5, 0xffff, 0x9, 0x8, 0xfff, 0x0, 0x200, 0x4, 0x10001, 0x0, 0x5, 0xe70, 0x8, 0x0, 0x10e, 0x3, 0xfffffffffffeffff, 0xc5c2, 0x9, 0x6, 0x5, 0x7f, 0xcc1, 0x6, 0x457b, 0x0, 0x1, 0x4, @perf_config_ext={0x2, 0x8000}, 0x88, 0x3ce00f64, 0xffffffff, 0x3, 0x100000000, 0x5, 0x2}, 0xffffffffffffffff, 0xc, r0, 0x0) signalfd(r1, &(0x7f0000000100)={0x2}, 0x8) [ 193.121125][T14421] FAULT_INJECTION: forcing a failure. [ 193.121125][T14421] name failslab, interval 1, probability 0, space 0, times 0 [ 193.133932][T14421] CPU: 0 PID: 14421 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 193.141658][T14421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.151723][T14421] Call Trace: [ 193.155038][T14421] dump_stack+0x172/0x1f0 [ 193.159385][T14421] should_fail.cold+0xa/0x15 [ 193.163987][T14421] ? lock_downgrade+0x920/0x920 [ 193.168852][T14421] ? fault_create_debugfs_attr+0x180/0x180 [ 193.174679][T14421] __should_failslab+0x121/0x190 [ 193.180252][T14421] should_failslab+0x9/0x14 [ 193.184778][T14421] kmem_cache_alloc+0x47/0x710 [ 193.189560][T14421] ? unwind_get_return_address+0x61/0xa0 [ 193.195205][T14421] ? profile_setup.cold+0xbb/0xbb [ 193.200249][T14421] ebitmap_cpy+0xcd/0x270 [ 193.204582][T14421] ? hashtab_search+0x1b9/0x250 [ 193.209445][T14421] mls_compute_sid+0x5d0/0xf60 [ 193.214228][T14421] ? mls_convert_context+0x6d0/0x6d0 [ 193.219534][T14421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.225792][T14421] ? sidtab_search_core+0x164/0x210 [ 193.231003][T14421] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 193.236741][T14421] security_compute_sid.part.0+0xafd/0x1600 [ 193.242668][T14421] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 193.249361][T14421] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 193.255183][T14421] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 193.261010][T14421] ? lockdep_hardirqs_on+0x418/0x5d0 [ 193.266306][T14421] ? trace_hardirqs_on+0x67/0x240 [ 193.271338][T14421] ? __kasan_check_read+0x11/0x20 [ 193.276383][T14421] ? should_fail+0x1de/0x852 [ 193.280988][T14421] ? sk_alloc+0x5d7/0xf70 [ 193.285338][T14421] security_transition_sid+0x126/0x190 [ 193.290824][T14421] selinux_socket_post_create+0x6a6/0x880 [ 193.296562][T14421] ? selinux_bprm_set_creds+0xc90/0xc90 [ 193.302218][T14421] ? lockdep_init_map+0x1be/0x6d0 [ 193.307266][T14421] security_socket_post_create+0x83/0xd0 [ 193.312927][T14421] __sock_create+0x5b1/0x730 [ 193.317538][T14421] __sys_socket+0x103/0x220 [ 193.322082][T14421] ? move_addr_to_kernel+0x80/0x80 [ 193.327207][T14421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.332679][T14421] ? do_syscall_64+0x26/0x6a0 [ 193.337364][T14421] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.343440][T14421] ? do_syscall_64+0x26/0x6a0 [ 193.348137][T14421] __x64_sys_socket+0x73/0xb0 [ 193.352834][T14421] do_syscall_64+0xfd/0x6a0 [ 193.357365][T14421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.363269][T14421] RIP: 0033:0x459819 [ 193.367174][T14421] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.386802][T14421] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 193.395316][T14421] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 193.403385][T14421] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 193.411391][T14421] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.419377][T14421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 193.427353][T14421] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 23:28:42 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:42 executing program 5 (fault-call:0 fault-nth:30): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:42 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x80000000008) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x101, 0x80000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000040)) r2 = dup(r0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000001c0)={0x0, 0x7, 0x1, &(0x7f0000000180)=0x95}) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000000c0)) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bic\x00', 0x4) [ 193.804624][T14449] FAULT_INJECTION: forcing a failure. [ 193.804624][T14449] name failslab, interval 1, probability 0, space 0, times 0 [ 193.817468][T14449] CPU: 1 PID: 14449 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 193.825117][T14449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.835186][T14449] Call Trace: [ 193.838501][T14449] dump_stack+0x172/0x1f0 [ 193.842856][T14449] should_fail.cold+0xa/0x15 [ 193.847463][T14449] ? lock_downgrade+0x920/0x920 [ 193.852332][T14449] ? fault_create_debugfs_attr+0x180/0x180 [ 193.858170][T14449] __should_failslab+0x121/0x190 [ 193.863135][T14449] should_failslab+0x9/0x14 [ 193.867650][T14449] kmem_cache_alloc+0x47/0x710 [ 193.872435][T14449] ? unwind_get_return_address+0x61/0xa0 [ 193.878166][T14449] ? profile_setup.cold+0xbb/0xbb [ 193.883209][T14449] ebitmap_cpy+0xcd/0x270 [ 193.887551][T14449] ? hashtab_search+0x1b9/0x250 [ 193.892415][T14449] mls_compute_sid+0x5d0/0xf60 [ 193.897202][T14449] ? mls_convert_context+0x6d0/0x6d0 [ 193.902504][T14449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.908758][T14449] ? sidtab_search_core+0x164/0x210 [ 193.913968][T14449] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 193.919708][T14449] security_compute_sid.part.0+0xafd/0x1600 [ 193.925638][T14449] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 193.932328][T14449] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 193.938138][T14449] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 193.943954][T14449] ? lockdep_hardirqs_on+0x418/0x5d0 [ 193.943973][T14449] ? trace_hardirqs_on+0x67/0x240 23:28:42 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) fdatasync(r0) sync_file_range(r0, 0x0, 0x2, 0x4) 23:28:42 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 193.943988][T14449] ? __kasan_check_read+0x11/0x20 [ 193.944014][T14449] ? should_fail+0x1de/0x852 [ 193.944031][T14449] ? sk_alloc+0x5d7/0xf70 [ 193.944055][T14449] security_transition_sid+0x126/0x190 [ 193.944079][T14449] selinux_socket_post_create+0x6a6/0x880 [ 193.944100][T14449] ? selinux_bprm_set_creds+0xc90/0xc90 [ 193.944118][T14449] ? lockdep_init_map+0x1be/0x6d0 [ 193.944142][T14449] security_socket_post_create+0x83/0xd0 [ 193.964048][T14449] __sock_create+0x5b1/0x730 [ 193.964073][T14449] __sys_socket+0x103/0x220 23:28:42 executing program 5 (fault-call:0 fault-nth:31): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 193.964091][T14449] ? move_addr_to_kernel+0x80/0x80 [ 193.964108][T14449] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.964125][T14449] ? do_syscall_64+0x26/0x6a0 [ 193.964139][T14449] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.964152][T14449] ? do_syscall_64+0x26/0x6a0 [ 193.964173][T14449] __x64_sys_socket+0x73/0xb0 [ 193.964191][T14449] do_syscall_64+0xfd/0x6a0 [ 193.964208][T14449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.964227][T14449] RIP: 0033:0x459819 [ 193.979696][T14449] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.979706][T14449] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 193.979722][T14449] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 193.979731][T14449] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 193.979740][T14449] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.979750][T14449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 193.979759][T14449] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:42 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 194.245402][T14473] FAULT_INJECTION: forcing a failure. [ 194.245402][T14473] name failslab, interval 1, probability 0, space 0, times 0 [ 194.288413][T14473] CPU: 0 PID: 14473 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 194.296093][T14473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.306156][T14473] Call Trace: [ 194.309467][T14473] dump_stack+0x172/0x1f0 [ 194.313829][T14473] should_fail.cold+0xa/0x15 [ 194.318450][T14473] ? fault_create_debugfs_attr+0x180/0x180 [ 194.324277][T14473] ? ___might_sleep+0x163/0x280 [ 194.329146][T14473] __should_failslab+0x121/0x190 [ 194.334096][T14473] should_failslab+0x9/0x14 23:28:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:43 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x4, 0xce) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101001, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x3, 0x2) [ 194.338613][T14473] kmem_cache_alloc+0x2aa/0x710 [ 194.343477][T14473] ? rcu_read_lock_sched_held+0x110/0x130 [ 194.349215][T14473] ? kmem_cache_alloc+0x364/0x710 [ 194.354253][T14473] security_file_alloc+0x39/0x170 [ 194.359291][T14473] __alloc_file+0xac/0x300 [ 194.363724][T14473] alloc_empty_file+0x72/0x170 [ 194.368502][T14473] alloc_file+0x5e/0x4d0 [ 194.372849][T14473] alloc_file_pseudo+0x189/0x280 [ 194.377822][T14473] ? alloc_file+0x4d0/0x4d0 [ 194.382314][T14473] ? __alloc_fd+0x487/0x620 [ 194.386807][T14473] sock_alloc_file+0x50/0x180 [ 194.391471][T14473] __sys_socket+0x150/0x220 [ 194.395957][T14473] ? move_addr_to_kernel+0x80/0x80 [ 194.401069][T14473] ? do_syscall_64+0x26/0x6a0 [ 194.405736][T14473] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.411820][T14473] ? do_syscall_64+0x26/0x6a0 [ 194.416488][T14473] __x64_sys_socket+0x73/0xb0 [ 194.421173][T14473] do_syscall_64+0xfd/0x6a0 [ 194.425694][T14473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.431581][T14473] RIP: 0033:0x459819 [ 194.435459][T14473] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.455055][T14473] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 194.463457][T14473] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 194.471436][T14473] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 194.479404][T14473] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.487475][T14473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 194.495473][T14473] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 [ 194.520145][T14455] XFS (loop0): Invalid superblock magic number 23:28:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8002000000000000", 0x37}], 0x0, 0x0) 23:28:43 executing program 5 (fault-call:0 fault-nth:32): syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:43 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:43 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0xfffffffffffffffe) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000280)) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="413797061c39f45c408292cc1d697daad6ced8efd683c03735536db792b0ab8639ba2a7aca1314d822b465f0f8d9ecce76e1a52ad55ae17e1b84563f82cf5ca7575a56fdb9f9268174537f465853e8c35d25bdb7d8e3875d101874a4db79e3", 0x5f}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000001701000004000000ff01051d532e0000900000000000000017010000020000007b0000006482a258251b56e263923b020004590671340000000000000000e81acd51ad221dccc00ea42a6c92f06617276d97fa02350035fb6318e5d2222c03e3055dc92d2a5bfb62067f5dbd9c4d6d49bf6a739d6ddf5500000080000000001b836b6994c5cb99bc36a53d2d383b382a9f56b5cdd68afb7ad200180000000000000017010000030000000100000000000000"], 0xc0, 0x850}, 0x804) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000000)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:43 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 194.928303][T14503] FAULT_INJECTION: forcing a failure. [ 194.928303][T14503] name failslab, interval 1, probability 0, space 0, times 0 [ 194.952553][T14503] CPU: 0 PID: 14503 Comm: syz-executor.5 Not tainted 5.2.0+ #56 [ 194.960332][T14503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.970393][T14503] Call Trace: [ 194.973700][T14503] dump_stack+0x172/0x1f0 [ 194.978049][T14503] should_fail.cold+0xa/0x15 [ 194.982656][T14503] ? fault_create_debugfs_attr+0x180/0x180 [ 194.988485][T14503] ? ___might_sleep+0x163/0x280 [ 194.993357][T14503] __should_failslab+0x121/0x190 [ 194.998309][T14503] should_failslab+0x9/0x14 [ 195.002824][T14503] kmem_cache_alloc+0x2aa/0x710 [ 195.007689][T14503] ? rcu_read_lock_sched_held+0x110/0x130 [ 195.013429][T14503] ? kmem_cache_alloc+0x364/0x710 [ 195.018476][T14503] security_file_alloc+0x39/0x170 [ 195.023516][T14503] __alloc_file+0xac/0x300 23:28:43 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x532c) syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 195.027949][T14503] alloc_empty_file+0x72/0x170 [ 195.032724][T14503] alloc_file+0x5e/0x4d0 [ 195.036964][T14503] alloc_file_pseudo+0x189/0x280 [ 195.041883][T14503] ? alloc_file+0x4d0/0x4d0 [ 195.046488][T14503] ? __alloc_fd+0x487/0x620 [ 195.050992][T14503] sock_alloc_file+0x50/0x180 [ 195.055653][T14503] __sys_socket+0x150/0x220 [ 195.060137][T14503] ? move_addr_to_kernel+0x80/0x80 [ 195.065255][T14503] ? do_syscall_64+0x26/0x6a0 [ 195.069920][T14503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.075967][T14503] ? do_syscall_64+0x26/0x6a0 [ 195.080630][T14503] __x64_sys_socket+0x73/0xb0 [ 195.085390][T14503] do_syscall_64+0xfd/0x6a0 [ 195.089878][T14503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.095752][T14503] RIP: 0033:0x459819 [ 195.099752][T14503] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.119365][T14503] RSP: 002b:00007fa7d6b10c18 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 23:28:43 executing program 5 (fault-call:0 fault-nth:33): syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 195.127846][T14503] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 195.135798][T14503] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 195.143751][T14503] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.151707][T14503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d6b116d4 [ 195.159678][T14503] R13: 00000000004c863f R14: 00000000004df2e8 R15: 0000000000000003 23:28:43 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x80000) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) recvmmsg(0xffffffffffffff9c, &(0x7f0000002140)=[{{&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/225, 0xe1}], 0x1, &(0x7f0000000300)=""/69, 0x45}, 0x200}, {{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)=""/22, 0x16}, {&(0x7f0000000440)=""/74, 0x4a}, {&(0x7f00000004c0)=""/74, 0x4a}], 0x3, &(0x7f0000000580)=""/55, 0x37}, 0x401}, {{&(0x7f00000005c0)=@tipc=@name, 0x80, &(0x7f0000000700)=[{&(0x7f0000000640)=""/160, 0xa0}], 0x1}, 0x8001}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/154, 0x9a}, {&(0x7f0000000800)=""/9, 0x9}], 0x2, &(0x7f0000000880)}, 0x40}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/7, 0x7}, {&(0x7f0000001900)=""/229, 0xe5}, {&(0x7f0000001a00)=""/50, 0x32}], 0x4}, 0x401}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001a80)=""/85, 0x55}, {&(0x7f0000001b00)=""/120, 0x78}, {&(0x7f0000001b80)=""/111, 0x6f}, {&(0x7f0000001c00)=""/3, 0x3}, {&(0x7f0000001c40)=""/74, 0x4a}], 0x5, &(0x7f0000001d40)=""/88, 0x58}}, {{&(0x7f0000001dc0)=@ax25={{0x3, @null}, [@null, @rose, @default, @netrom, @netrom, @null, @null]}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001e40)=""/118, 0x76}], 0x1, &(0x7f0000001f00)=""/47, 0x2f}, 0x3}, {{&(0x7f0000001f40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001fc0)=""/63, 0x3f}], 0x1, &(0x7f0000002040)=""/211, 0xd3}, 0x10001}], 0x8, 0x1, &(0x7f0000002340)={0x77359400}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002380)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000023c0)='/dev/full\x00', 0x4e800, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000002400)='/dev/dsp\x00', 0x100, 0x0) r8 = openat$vfio(0xffffffffffffff9c, &(0x7f0000002440)='/dev/vfio/vfio\x00', 0x2180, 0x0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000002540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1040000}, 0xc, &(0x7f0000002500)={&(0x7f0000002480)={0x5c, r1, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x57a}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc880}, 0x20000001) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:44 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 23:28:44 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 195.529666][T14524] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8002000000000000", 0x37}], 0x0, 0x0) 23:28:44 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e22, 0x0, @loopback, 0xfffffffffffffff8}, {0xa, 0x4e23, 0xd775, @mcast2, 0x3}, 0x8, [0x5, 0x3, 0x6, 0x8, 0x63d, 0x400, 0x1ff, 0x3ff]}, 0x5c) syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000000c0)={0x0, 0x8, 0xc0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0xffffffffffffff80, 0x200, 0xfff, 0x1, r1}, 0x10) 23:28:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:44 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:44 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:44 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:44 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:44 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e21, @local}, {0x1, @dev={[], 0x29}}, 0x50, {0x2, 0x4e20, @loopback}, 'yam0\x00'}) socketpair(0x13, 0x8000a, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 23:28:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:45 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) [ 196.334192][T14574] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:45 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:45 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8002000000000000", 0x37}], 0x0, 0x0) 23:28:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:45 executing program 5: syz_init_net_socket$ax25(0x6, 0x5, 0x0) 23:28:45 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:45 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x20, 0x4, [0x0, 0x4, 0x6, 0x3]}, 0x10) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@bcast, @null, 0x6, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null]}) 23:28:45 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:45 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:45 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = dup(r0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x54, "9f4f29da9332d992c0b0b8b140959ad57510a58916a932c6b945a725044c85e0e75bf5b77a14dd98b12ccdc262a1aac6de921b7c86292b2358020e49721b6e3d38999def369630b03b7c737659d335f833eb25d5"}, &(0x7f0000000180)=0x5c) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={r3, 0xffffffff, 0x30, 0xffffffffffffff00, 0x3}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r4, 0x8, 0x30}, 0xc) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f00000000c0), 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000200)={0x4c, 0x67a, 0x255, "ba2640c70ca4724e7e1c90f9fc1e6a07514aa967903a13f1b2309621870a021032859b6b1e2b1cb259d5dc8798e918d274988cb46bf73adb71ceb56ad68512da3b5bdaf33192e8ef6c430872"}) 23:28:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:45 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) [ 197.104633][T14629] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:45 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000", 0x53}], 0x0, 0x0) 23:28:46 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xfffffffffffffffd, 0x40000000, 0x965, 0x0, 0x1ff}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1}, 0x8) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:46 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:46 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:46 executing program 2: syz_init_net_socket$ax25(0x3, 0x5e471933ad98b434, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xff, 0x280) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000440), &(0x7f0000000480)=0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x114, r1, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x61}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7d}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5900aaabdbd3fd66}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x6}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x61}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044000) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x4, @mcast1, 0x3}}, 0x200, 0x1, 0x7, 0xffff, 0x21}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r2, 0x101, 0x2, [0x100000001, 0x3]}, &(0x7f00000001c0)=0xc) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 23:28:46 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:46 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 197.946215][T14689] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:46 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x7530}, {0x77359400}}) 23:28:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000", 0x53}], 0x0, 0x0) 23:28:47 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:47 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:47 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e21, 0x50, @mcast1, 0x8001}}, 0x0, 0x9, 0x0, "d69e927343f6db99041df1c07a41811ca7dc2fb9a336b7db9b1db2e770a688360fd2b7f29905e0dddd7a7c572843d31626ebd8b38f32a99ce6de97d368e2ae45dad04671d5218452ef4a68cdc85e68df"}, 0xd8) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000140)) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x82cb, 0x80, 0xdc7c, 0x3, 0x0, 0x3e, 0xffff, 0x2ca, 0x40, 0x366, 0x5, 0x13, 0x38, 0x1, 0xfae, 0x1, 0x3}, [{0x70000000, 0x7, 0x9, 0x40, 0xffffffffffff7e62, 0x2, 0x3}, {0x6474e555, 0xd3f, 0x4c6, 0xfff, 0x9, 0x9, 0xd48, 0x100000000}], "669581d6cb5fbdc25d3789824e729af17e19600fa71ccfb17b79ecfbde53d21220478c01e6b24ba8cab6590aa16322adc970e89aeb2ff8f13f33dcc5bd30dd2ca52446bd58043b9eb5d4d2cbeced72fe33201d433314b30e4618eed14c955dc23c51d9c5c116b041e5f8217849f6eb022c68bfb0c8880eae943b7b1f312e295f0778eeec84abc5cd44c6cc6fbe40407a125769b4315a791a8eea2ced7557ecf413bd6e271aa3ec9b43433cec71eb0166887f85a867695a6a", [[], [], [], [], [], []]}, 0x768) syz_init_net_socket$ax25(0x3, 0x0, 0xfffffffffffffffe) 23:28:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:47 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:47 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:47 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 198.677525][T14746] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:47 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:47 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000", 0x53}], 0x0, 0x0) 23:28:47 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffff5, 0x2}, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x100000000ce) 23:28:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:47 executing program 5: syz_init_net_socket$ax25(0xffffffffffffffff, 0x5, 0x0) 23:28:47 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:48 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x400000000d0) 23:28:48 executing program 5: syz_init_net_socket$ax25(0x3, 0x2, 0x0) 23:28:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:48 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:48 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001280)='/dev/snapshot\x00', 0x101082, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f0000000100)=""/20, 0x14}, {&(0x7f0000000140)=""/94, 0x5e}], 0x3) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000200)=""/4096) epoll_create(0x7) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000001200)={0x0, 0x0, 0x1, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x6}) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 199.724059][T14805] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:48 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:48 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) 23:28:48 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x10000cb) io_setup(0x1, &(0x7f0000000000)) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14, 0x67, 0x2, {0x14, 0x2, 0x5}}, 0x14) 23:28:48 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:48 executing program 5: syz_init_net_socket$ax25(0x3, 0x4, 0x0) 23:28:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:48 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:48 executing program 5: syz_init_net_socket$ax25(0x3, 0x6, 0x0) 23:28:49 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x501000, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0xc029, 0x3}) 23:28:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 200.501464][T14868] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) 23:28:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:49 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x3f, 0x40) r2 = dup3(r0, r1, 0x80000) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000140)=0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) clock_settime(0x7, &(0x7f0000000000)={0x77359400}) 23:28:49 executing program 5: syz_init_net_socket$ax25(0x3, 0x7, 0x0) 23:28:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:49 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:49 executing program 5: syz_init_net_socket$ax25(0x3, 0xa, 0x0) 23:28:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:49 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x4, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x2, @remote, 0xf8ef}], 0x3c) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000000140)="21bd31e196bc913b09610c3d613a48fafd51d7a253fa7a3a50ec2004cd0b1e8292d7c347e775da65534db534f42949ae1bb59c46d34547c65c7d58993dc55cdc62abd4eb262b6ac94bed02b42ac2e146a3c99935774bc494c1ce398792f064e248c1b7741578ad6558a1c709b7939000084d0a2c32c145f6022e8075f3ad1b9950069244e51caa0bf77572f00248c0d45db85b48d76d7630fa777f12e1498be4c0ad3d8300949f83efcad47e2dd5ca9e62e548f7f1f084", 0xb7}, {&(0x7f0000000200)="3760ebd1bb2d181f7a9f181e77b5d1f73fa7cc79cf41f019f337028352103fff2245acf51200f80a1ba197d20e55a38e661174", 0x33}, {&(0x7f0000000240)="86de8ae46be3bc0dc59c162b69c3", 0xe}, {&(0x7f0000000280)="795c64e58c3c0f1606caa42e4c3774c97cd78101a19b50fad29e5b006e3354805c7bba790bd32e4dfde8ba7a3b5b61c0974fe923d077daa3ca6d93a5619c5660b697023b3029d69571cf", 0x4a}], 0x4, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000000)={0x0, 0xd5c, 0x4, [0x3, 0x100000000, 0x6, 0xa2]}, &(0x7f0000000040)=0x10) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r2, 0x8}, 0x8) 23:28:49 executing program 5: syz_init_net_socket$ax25(0x3, 0x10, 0x0) 23:28:50 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 201.395108][T14924] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) 23:28:50 executing program 5: syz_init_net_socket$ax25(0x3, 0x1b, 0x0) 23:28:50 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:50 executing program 2: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='cdg\x00', 0x4) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f00000002c0)=""/237, 0x26, 0xed, 0x1}, 0x20) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000040)) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r3, 0x3f) fcntl$addseals(r1, 0x409, 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:50 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:50 executing program 2: msgget(0x3, 0x541) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:50 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x2) 23:28:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 202.201179][T14981] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:50 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:51 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x3) 23:28:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 23:28:51 executing program 2: syz_init_net_socket$ax25(0x3, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x7ff, 0x440200) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40, 0x0) write$9p(r0, &(0x7f0000000080)="28f5a549501044ee0ac9d4bbe6802bf9d9ed527f32112de0035a636462afda470b4b202b1d7d267e090a8108a4bcb300ee4d2ee09cfc713a8a55b54afed178e95f502d76a00f7bd040ed34783594ef5f1941827fb7d50e25e507e5315e5910647ae73c1bc58766e11221a03e74774d2f5a9a", 0x72) socket$kcm(0x29, 0x7, 0x0) 23:28:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:51 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:51 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4) 23:28:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:51 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200800, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x40, 0x8, '9P2000.L'}, 0x15) 23:28:51 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:51 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x5) 23:28:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:51 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 203.044975][ T5] XFS (loop0): SB sanity check failed [ 203.051422][ T5] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:51 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:sulogin_exec_t:s0\x00', 0x24) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0xe) syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 203.168605][ T5] XFS (loop0): Unmount and run xfs_repair [ 203.214756][ T5] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 203.222176][ T5] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 203.222200][ T5] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 203.222212][ T5] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 203.222224][ T5] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 203.222243][ T5] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 203.308498][ T5] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 203.361335][ T5] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 203.395100][ T5] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 203.410293][T15038] XFS (loop0): SB validate failed with error -117. 23:28:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 23:28:52 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6) 23:28:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:52 executing program 2: syz_init_net_socket$ax25(0x3, 0x2, 0x1) 23:28:52 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400080, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x10000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @broadcast}, 0x3ff, 0x1, 0xff, 0x8, 0x1, 0x1}, 0x20) 23:28:52 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x7) 23:28:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:52 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 204.285089][T15112] XFS (loop0): SB sanity check failed [ 204.290854][T15112] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 204.339924][T15112] XFS (loop0): Unmount and run xfs_repair [ 204.347314][T15112] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 204.380113][T15112] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 204.391105][T15112] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 204.400588][T15112] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 204.438057][T15112] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 204.459097][T15112] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 204.468621][T15112] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 204.484642][T15112] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 204.497758][T15112] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 204.509036][T15112] XFS (loop0): SB validate failed with error -117. 23:28:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000010000100000000001000000000000", 0x62}], 0x0, 0x0) 23:28:53 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x8) 23:28:53 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x7) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80001, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x10000) 23:28:53 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\v', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:53 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x27) 23:28:53 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:53 executing program 2: r0 = gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x800) r3 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x4, 0x200000) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000180)={0x3, 0x3, 0xffff, 0x3, 0x2}) kcmp(r0, r1, 0x0, r2, r3) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:54 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:54 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x2f) 23:28:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 205.404858][T15166] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:54 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000010000100000000001000000000000", 0x62}], 0x0, 0x0) 23:28:54 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x7f, 0xdba, 0x4, 0x8, 0x7ff}, 0x0) syz_init_net_socket$ax25(0x3, 0x8000000000001, 0x0) 23:28:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:54 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x48) 23:28:54 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:54 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:54 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4c) 23:28:54 executing program 2: request_key(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffffe) r0 = dup(0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r0, 0xe, 0x2}, 0x14) 23:28:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\v', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:54 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x68) [ 206.137521][T15222] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000010000100000000001000000000000", 0x62}], 0x0, 0x0) 23:28:55 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x20) getdents64(r0, &(0x7f0000000100)=""/52, 0x34) syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x69b3, 0xfffffe7f) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000001c0)=0x3) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000200)={0x2, 0xa2b}) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000180)) 23:28:55 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:55 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6c) 23:28:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:55 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x74) 23:28:55 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:55 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "8d743602e535b504", "4b97d311a41156f32dbd1ee5b2d1c5c9", "9d07e748", "687559dddef5e7db"}, 0x28) fgetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)=""/11, 0xb) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000040)) [ 206.858728][T15280] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:55 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x7a) 23:28:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:55 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:56 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000001c0)=0x8001) r1 = semget(0x2, 0x2, 0x1) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000000)=""/25) shmget(0x1, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x200, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x100000000, 0xe79, 0x5, 0x3, 0x0, 0x5, 0x40000, 0x1, 0x8, 0xff, 0x3f, 0xb8, 0x7fffffff, 0x4, 0x6, 0x5, 0x200, 0xf3d6, 0x9, 0xfff, 0x100000001, 0x80000000, 0x9, 0x1, 0x7fff, 0x633e, 0x8001, 0x100, 0x1, 0x6, 0x2, 0x401, 0x5, 0xbf, 0x9a, 0x6, 0x0, 0xffffffffffffffbb, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x2001, 0x100, 0x4, 0x7, 0x0, 0x40400000000, 0xd9}, r2, 0x8, r3, 0x1) 23:28:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:56 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xc0) 23:28:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 23:28:56 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:56 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcc) 23:28:56 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:56 executing program 2: clock_gettime(0x2000000000001, &(0x7f0000000040)) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) 23:28:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsB', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:56 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) [ 207.852343][T15341] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:56 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcd) 23:28:56 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:56 executing program 2: syz_init_net_socket$ax25(0x3, 0x7, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x401, 0x200) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000040)={0x3, 0x80, 0x5}) 23:28:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 23:28:56 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:56 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcf) 23:28:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsC', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:57 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x300) 23:28:57 executing program 2: getuid() syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:57 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 208.603401][T15396] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs>', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:57 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x24000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x321, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:28:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsD', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:57 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x346) 23:28:57 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 23:28:57 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x101, 0x400000) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x100) syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x10001, 0x9, 0x8, 0x2, 0x6}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r2, 0x8, 0x6, 0x9, 0x160ad608, 0x4}, 0x14) 23:28:57 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x480) 23:28:57 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:57 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = semget(0x3, 0x3, 0x1fb3a46863bd57cd) semctl$SETVAL(r0, 0x3, 0x10, &(0x7f0000000080)=0x2) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x900, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x3, 0x4a2, [0x0, 0x20000100, 0x200002ee, 0x20000572], 0x0, &(0x7f00000000c0), &(0x7f0000000b40)=ANY=[@ANYBLOB="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"/1246]}, 0x556) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x4, {0xcd, 0x8, 0x200, 0x2, 0x100, 0x7fffffff}, 0x2, 0x401}, 0xe) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000100)={0x3, 0x32525942, 0x2, @discrete={0x81, 0x3}}) 23:28:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsA', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsE', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:58 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x500) 23:28:58 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 209.564266][T15454] XFS (loop0): device supports 512 byte sectors (not 0) 23:28:58 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) uname(&(0x7f0000000000)=""/26) 23:28:58 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsF', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402", 0x67}], 0x0, 0x0) 23:28:58 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x600) 23:28:58 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsF', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:58 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x81, 0x1) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x3, 0x301b, 0x5, 0x0, 0x0, 0x0, 0x5}}) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) 23:28:58 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsH', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:28:58 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x700) 23:28:59 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0xcc) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="9c10a3b3af6d7375a9afcf3940be3675144efff5fcb9aa8dccb9646bae45a3a793bd3b58f44f11faf5b33f9c00c57eef5f0ce0ff3028588be41aa67550dbb0f819de0328c0df3f4e6141fb81996d39eeacbe9f6100cbd93ac42bdca48763b7690a46de8e7e51ac00f344332360982b7bc4d5df196969471d874e8193e0074a0e2d55fc0e2a018ce65b8782c17c7c42b92041340df8c79472fb9eab2fb88e62591a1ef9040040209051723f0b8dc7ef0ea68c07ef7f885484ec0ba3b4dbe696c185a3ece0efa89cd5c81b201b09c53a9d6209f23f4ec042bef5cde95750166006d676598780fedfd1da61130e0e0da982e1f1945091b3c439c4a85a01c547ed81a8fc72f1fe7d8f293dc57cb5709a6e1c0e4293ef09663251d5dfcd30109ee8ff0e379733996663c139774485cd038a76eef4a4f087408dc1924da0c6aebfb1fe74195cb3c9e52fae67774f71be7cca0a739ce637d29b72b661ec74db9e2aeb2612d2b72d8b7d622e569de0cef08638ac4c1470c8dbe827d28eb439942837221e96ffb26c7cc3c67e42e22f1db73377c9019bbe8b6f3a354516d27f0558dd26027b20ad9c1525dac1950a5380ad4c03b528003e4d91037c5b1efe699c4236f105487d7ca51332a0575addb739ce665a6efcc4f127000931e105d10243a4c3062e99a07adfe7a15a3bae1eaf0b8bdd4d4e68203d1754b43d6021d7046967976bb4c1b153c44e6d031d74cbd63b4858aed7140acbdab7bf875907c28885281d0e16070b0e5f47bac9d25538966ea227ae23158080194af512ce5d2733faf2ab9be175d86e6cad8eb8bd95bf59746153bdcdc03608cd01fdabaf1960ce5db4ab4a671b164f95a446111b653025b499d59f007411c8b4e7360a2ee7bb088e14932dcb6a876d6418ede31c86ce503a5aa626812b77fee294d54eab98e9587ff8672c90a805c47e6baf8996871254197391ccd2c11a82ae67ee5f9fed72afdae464b60efc078fbd9f3e036f9f5221ca356eb1b6db2896e50f5a4f28a6db709840197487c3f8d21b298df08d6887927fc0e77c266fceae73a77c1456d95a4e6899ed37686c62243e5874458fd260e3923057a51140c8a0d34da2f2ef29187fb122de19337b01ebba8254954f7428dd914b63ba701ffa4b5c1f8a78be9f3e90e784032d859a6f0801172ac7ec2f703541089c2e7dd20929002071c77d66f0c01ebc4fd566ca3227064a9126e87495163ff722c759a9ae0658fcd798e7fb3360365282d4ae380c44621a4af743a62c41d6929f0a1cc00e77f4a5a5ae756a2694fefa0ca49b9b872bc7c8c383b622e85b16fcc3729f2c8e3c961add65ea82fbedf2435fb8dea578480e2cca1db63ccd41a0601d1102226ccf6ba5c6109224d9e74901578d48b58e9413a9d5d8920bd5f828ccb8e37623828342565ed3075fe88deb5ce6eaf7471d6ac398823daa602cdbfbb59ca35f69abafb641d4d0638d3cfd25c8225cee8ebd6db305edfa4ccde1514e187c4d15f86c28ecc3b4359a21776b8255519153119ada32fd7ac527dd4f491cc4d25195a5d8875cb5558ae8c433da9dd97350ef2f26cd776e238f3b483c2b08776a27e970950ddfc5d1ea2eaafd1a3e5c0638cf65b80d4e12c5a9ed1f92a1035d01a6ea2eb9258e572d18556bd92634822e807ff42e7b25835d634335c49bf552b8d965d2a3552cc573739d16f1460fc1472a8db67b24e1dd2cf8cb1aa8af87c7e25f2def6d2d304436f90572455b56338ee97b898fd0e85889e29760741441f028d9b8bfb47028e8f880717c6355f18ff8488b7ce701eff1dff55a19b302017c29b8ab12caccd2b2f8212a1c1006bf606baa9f67f8684ef5454470b5af0633937ad8381625a37c0e5516a0283d7992678c03100eca885279b3419e22b3f62b69d2780022bf0d82ae11d09f822bb8e30afb3abef8ca16dfd1fae45d49a7c60bf47f8591b8cff91b196012b853c8ee4ee7919ea2eb5b4f8f335a215f56888e66a1167758cab0142dd88b84492bb07926068a86405936ba3db91f1a48c6a11b2fd0b0ab53891d2f9b964adac933f5e35744281ea397faa9a0beec5ce7322c303d3189a0d43bbcd420b87513f4fe7bde02099c90983a34d0477a3c7aa031b31bedf53eaaa9890184768d06ff4cbdf4730e4d95c47540eb7c39ec6caea35ad77951b40197741ab87e1bcc56ca785507a6456035075e245bd8f89ccfae5ef85eb067dd726ecd0c36640e1506d768499df9088b20c28ec6aa394c52e7e721762165454a4b032792910ddfb14cbaa086b09f531254cac01e8c83a504ecbc30cb5d276d80ad5ba469a78057b4a15d729a46cd8e2d516d144f2683ff0914ade09aa51606ca34a6960f1448134468f542d6c20ae4b7336a88f2a4e312a79eb3619975cc3df858202b18e0936f934407df7ba03ef4a3219fdb7a57949dbe258622065ffe5ac16b128e39a4da6f72a81a06e54d6b8c446a59068c490ae7e661623386a07e3b03af86bf515fc227759391e57958e79d1b76be9ed8052607d3f049341158eac6c627fa9718951841ac5f0ac494a0e63a98df8f4df03e9a5c48c521e421058e6e28c063f7cc518b1d2e95d421a353b5e4f5c6eef85cdd1fbd98f79d37dd5edee93164d9824337d32244d3586484cb12f53e92d77f0f9480febea6a6d45489b11b7ccbffdc8bea5e359e2617d841d21d87d92b4dc29cd1f6759cf8111321a1796109068a833af2a292541fb5d61d13377e93ce45b4619866c1c7850617f6cdee74b630348c4800279224783d358c5158d639331618f52ec0646a77a2508742ac337328b257ab7472aefdd0dedaebf4ade6eb600efdea88340dc99408708f73b30da3bbc223b7a177e2736aab8ee4ffc785c689efe0f60c9d7c468fdb58869587b84dc7c948bc07a0bd51aeba7d2af4af2eeee4cb9291c236d62d09473cf1c4de18c439b3cb0ac55f52d15cb92060ff08970ab9599d2b9c990659a93605d5bf41ab22a07078fae053acc497445a2c506d2c7ff5d9196dbf70bf8ff276b33bfe1dc7f7d607f1388eaf4d54881ffcdcface11518429233863e2fa044d840f37f139fafa47f859f901e00c7b74605bb11aa90481cb94502d733ef5793c412bf7835981c997f5d8466e77170d82268dc7952000c880f05219cba62b7fe0a90893b3bfd98495d77fc076867405c7e93c9754d1d985e13d017d2e737bc3abb1787f01fb771a92f71e11339c7876bfd7de329a576b400e44b5c89ab41e8126cc4403b13dc0dde7b508c1897b30c04e6e57f8c58a2ad9eda3449f51a45ee3d8d1c0dc284e719a007304376b31a97f480f2c895d5122821d3f401414ac45b4349040c1df3b0b469178aafdeec30e99ea8eb05dbd5d5d21e03e497d21e7279d0ecc55b316173353798cf2af86011d1f99b70b542139b6a68624f830d2eaf813766d40026a68f6d2b47bf574c4811190d96e2763edd52fc1e840553718be780418ac3db98f04db695a4dd887009683c8d2a0c6f70a799814a017046cc76c36bdb4577a1678b19ccbc85d7b3d7701445196b9eadab03b9804d2577451b7ec236d16db0bdd10b5dadf0f6477f420c0c89b7881ce8cb77f8e45604758b777f463fe7dd6cdac200e0e9c749b8db6ef2dd996be5c59955c8877f4f300aa3681ede5a8629ff599a5f8fe538b454eb812ffa22fc1b2bcb4890f3ad2a8fd5e8d6b79fb3d87b89fa03d6af4de4540f6e28bf720af5fc2753f8964029436716eb69a6a0a9e75421545e575ab25eb28fb511dde39d5578bf64a624505181f0c1eb4e55c2f2667d5a9d0323afdef5a512ebd8f25bb55cd97ce3f0a0272af2b51a7910ecadabac6df43e7a498f8cf32603a358ac5830f4873d88e26bc83d04374bb98f8c025753f85dcc414d2706e1c914f921c15c1bfddb13375e58a0320f5eb96df20720591d5a5f1db14ab35e0fc2c517631c36897ce718c25871537a5745f91eb32163a04dca37952e63949253b388dc72e8e02e6240a9d63cc21d78e8dc7b4585c1bacb93fc7ef0d55350c0ccb73c121bdf6f3ad929f364a6a7e7ddf918dc37d2b8ec24de03a32bdaf0129ccc9c70f9129e4efba1466eb39f8a9ab0323fb099196aa78467ba4c6267d4942e9493e32f832cb2b580ccc3bdacf104e98c82fc84cf67bc211a618671f98d4df068c234389e58fdc7736945f062155bc1b2f9a66426ad4d9f0e50d59ad7b16490428d64e95551c64c549773d014402bad90e7bdd5b1db26391db9e26efa55a10fd5d3523419916e0be2d4ad9fefdcb78f79214c2227d1428382d1db49edddc5cb79cea605a603203dffffd08deb1436d1d2051636935a9c781440b2b1c29627e92f34ce79282b5de0ca5a39a83cb7e4de93c40a55534654cb73d9f21161568ec9feb09052b59a06c42732aa2a048ee3adf6340c4790de1640a899d7d46ff455e8c430981e43ef4293aceafc7e93d3e478a13217e86868de26c90e2120c480645209eb0b1f8bf6f4137a3d53a23aef43d36e9f475b4e618738ef80266e0d2ce64dade16e8db4c98aa84c463ccf12ed2a68804ebb0af02e0cc6330d5349d711633015c267cf1398a8439b35a4de2117daa7f75978ce90060bad9085ebc2276ef27a60109cdfa3a5787ba1cd2e88934ab722f097be9099ec93c4794d71a0b38fbbad249c0d25248396af5cffb5dbea0508c8809437c6e243bedcabe43e4ad77a9139f7e5b87ee2eb8b810f41c9a52d9ac33c106aee4df53a72b1e918267af563cec6a7b8cd2c16af5252968701507a01889e28b81e8259e5f3242e86505b74b7ece370bb4b6f53d7578327c15c3045b37ead2ecd5f5b4fa78f806de4801ad22876482c2a0e8ad15887407772e46de2d1f95d2e852090e136b2981fe93e28f59bb0009a9ab1632abd9c5052d2e4cd15f50adf567a29414690fe68abef6217cf3589f6f4f137dda93f29be1c91c0f2c471d1957fd65b8139cb1d100dd7a80ca2c5467f4bea88fbfb42cb9c7a544388c33c588efd6ca56c375fc692ed284f2815e14b1ff534c05ce987a4173dbf4dd3c61f416ea6daf033d2722294f0328a9d8d5e954b45e57d9d28b89003641fb4429af3282211b5bb6a5a0914994af1b0c3faceaaa90f62af07ef5346659696a80657ace347f7f3eaf50d6932d53471c0ff2e3fdd025ccebdc4958a13e323ff143b6fab89cef886e1eec9f04f7bc3da732ec67dac9de1fd368776ad9849ea979cbcd2b7070a1c267f61c12623fb1a799445b471abf80dced7e63ae80ae9caba1332b7d939a644a6e2423130fe34ea3aa754c16bddcf1ffe986d208934ab53a85df5ebb3ae2b291ce9a0368755e2bc3dc2857338c3db707ae5e7782dde875d5179d2fbe698a51e9335c75d728bab1ca0c250b5a979f6706bea5a25b20802d919f762054049cb5ea03fc07af65de724810924f5295f67211e9a13cc8ab5bdcaa500bbb567f69ca4bea41d93246620895fd1ebb18d6d8842be855f0fc284c656698a541eb1f19b30bdf338f48327bfb308376b86035a17d405190f8894089fd4ea4dbaf437085d968495a0184456bfd75249ebb600d571a4b105d4da45715ecd9d8f90c999b9bd08d04b3bb1f95f816201128210a18daec2d95296012388ca822bca0e574d0fc4a02c5131dc2e1c29701b1587ea94ccaa519016361998c415f6466afd1830190c8c6f49d814a019928fd3b3302e51fbca5537a7bb08cdc7dd55a09ba5577c85f250a10bc72e3ac5ee708b8a7f7eabf7334fcff66084e9c2de8df16dd845b088d07099ad2", 0x1000) 23:28:59 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:28:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 210.489611][T15524] XFS (loop0): SB sanity check failed [ 210.513396][T15524] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 23:28:59 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x2700) [ 210.618862][T15524] XFS (loop0): Unmount and run xfs_repair [ 210.677019][T15524] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 210.702624][T15524] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 210.732603][T15524] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 210.764579][T15524] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 210.787141][T15524] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 210.879104][T15524] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 210.907484][T15524] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 210.938443][T15524] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 210.958349][T15524] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 210.967730][T15524] XFS (loop0): SB validate failed with error -117. 23:29:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 23:29:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)={0x0, @aes256}) sendfile(r0, r0, &(0x7f0000000100), 0x1f) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000140)={0x36, 0x6, 0x0, {0x2, 0x2, 0xd, 0x0, '/selinux/mls\x00'}}, 0x36) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0xffffffffffffffdf, 0x3, {0x3, 0x2, 0x0, 0x3, 0x3}}) 23:29:00 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:00 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x2f00) 23:29:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsI', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsd', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:00 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x3f00) [ 211.398585][ T26] audit: type=1400 audit(1563233340.070:351): avc: denied { ioctl } for pid=15579 comm="syz-executor.2" path="socket:[45207]" dev="sockfs" ino=45207 ioctlcmd=0x6614 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 23:29:00 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) 23:29:00 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:00 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4000) [ 211.732333][T15599] XFS (loop0): device supports 512 byte sectors (not 0) 23:29:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 23:29:00 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:00 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) syncfs(r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x2, 0x4, 0x8}}, 0x14) 23:29:00 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x416d) 23:29:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:00 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:00 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4603) 23:29:00 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x1) r0 = geteuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x97, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="c07e0d49978e12cb8d246e9e65026f36493b1389736bf292490a893be3258b8523bea220237a1732ebd1925463f34238f98df08f6cdaa1fbf6e5c40311d7a35ba605bb636b460558760a84b6af7066aa23f3a236417f", 0x56, 0x9}], 0x2, &(0x7f0000000140)={[{@errors_recover='errors=recover'}, {@show_sys_files_yes='show_sys_files=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@dmask={'dmask', 0x3d, 0x614}}], [{@subj_type={'subj_type', 0x3d, '\\'}}, {@euid_lt={'euid<', r0}}, {@smackfsroot={'smackfsroot', 0x3d, 'wlan1eth1wlan0&self{^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x77, 0x0, 0x37, 0x36, 0x62, 0x77, 0x77], 0x2d, [0x31, 0x0, 0x65, 0x64], 0x2d, [0x0, 0x38, 0x77, 0x7f], 0x2d, [0x32, 0x77, 0x64], 0x2d, [0x35, 0x61, 0x36, 0x36, 0x37, 0x0, 0x33, 0x37]}}}]}) r1 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x1) 23:29:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsd', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsq', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:01 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:01 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4800) [ 212.550231][T15653] XFS (loop0): device supports 512 byte sectors (not 0) [ 212.634222][T15660] ntfs: (device loop2): parse_options(): Unrecognized mount option subj_type. [ 212.682688][T15660] ntfs: (device loop2): parse_options(): Unrecognized mount option euid<00000000000000000000. [ 212.732014][T15660] ntfs: (device loop2): parse_options(): Unrecognized mount option smackfsroot. [ 212.816655][T15660] ntfs: (device loop2): parse_options(): Unrecognized mount option fsuuid. [ 212.987631][T15671] ntfs: (device loop2): parse_options(): Unrecognized mount option subj_type. [ 213.004243][T15671] ntfs: (device loop2): parse_options(): Unrecognized mount option euid<00000000000000000000. [ 213.015039][T15671] ntfs: (device loop2): parse_options(): Unrecognized mount option smackfsroot. [ 213.027780][T15671] ntfs: (device loop2): parse_options(): Unrecognized mount option fsuuid. 23:29:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 23:29:01 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:01 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4c00) 23:29:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:01 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = getuid() setresuid(r1, r2, r3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80102, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000080)={0x8, 0x0, [], {0x0, @bt={0x1, 0x7, 0x1, 0x3, 0x7, 0xfffffffffffffffe, 0x4, 0xfffffffffffffffb, 0x81, 0x32b, 0x8, 0xffffffff, 0xd91c, 0x0, 0x2, 0xf}}}) 23:29:01 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6800) 23:29:02 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:02 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:02 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6c00) [ 213.600014][T15710] XFS (loop0): device supports 512 byte sectors (not 0) 23:29:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:02 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:02 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x6, 0x8000, 0xaa6}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e20, @multicast2}}, 0x4, 0xff, 0x2, 0xfffffffffffffff8, 0x84}, &(0x7f0000000180)=0x98) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:29:02 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6d41) 23:29:02 executing program 0: 23:29:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs(', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:02 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x7400) 23:29:02 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:02 executing program 0: 23:29:02 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200000, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') fcntl$setlease(r1, 0x400, 0x2) 23:29:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:03 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = getuid() setresuid(r1, r2, r3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80102, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000080)={0x8, 0x0, [], {0x0, @bt={0x1, 0x7, 0x1, 0x3, 0x7, 0xfffffffffffffffe, 0x4, 0xfffffffffffffffb, 0x81, 0x32b, 0x8, 0xffffffff, 0xd91c, 0x0, 0x2, 0xf}}}) 23:29:03 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:03 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x7a00) 23:29:03 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', 'procselinuxGPL.}\x00'}, 0x17) 23:29:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:03 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:03 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x8004) 23:29:03 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = getuid() setresuid(r1, r2, r3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80102, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000080)={0x8, 0x0, [], {0x0, @bt={0x1, 0x7, 0x1, 0x3, 0x7, 0xfffffffffffffffe, 0x4, 0xfffffffffffffffb, 0x81, 0x32b, 0x8, 0xffffffff, 0xd91c, 0x0, 0x2, 0xf}}}) 23:29:03 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0xffff, &(0x7f0000000080)=0x4) getsockname(r0, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000140)=0x80) 23:29:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:03 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xc000) 23:29:03 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:03 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = getuid() setresuid(r1, r2, r3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80102, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000080)={0x8, 0x0, [], {0x0, @bt={0x1, 0x7, 0x1, 0x3, 0x7, 0xfffffffffffffffe, 0x4, 0xfffffffffffffffb, 0x81, 0x32b, 0x8, 0xffffffff, 0xd91c, 0x0, 0x2, 0xf}}}) 23:29:03 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) 23:29:04 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcc00) 23:29:04 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 215.401785][T15828] XFS (loop1): Mounting V4 Filesystem [ 215.409941][T15832] XFS (loop3): Mounting V4 Filesystem 23:29:04 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = getuid() setresuid(r1, r2, r3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80102, 0x0) 23:29:04 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x9, 0x7fff}) [ 215.456942][T15828] XFS (loop1): empty log check failed [ 215.470309][T15832] XFS (loop3): empty log check failed [ 215.477599][T15828] XFS (loop1): log mount/recovery failed: error -5 [ 215.479137][T15832] XFS (loop3): log mount/recovery failed: error -5 [ 215.554852][T15828] XFS (loop1): log mount failed [ 215.582886][T15832] XFS (loop3): log mount failed 23:29:04 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcd00) 23:29:04 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:04 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = getuid() setresuid(r1, r2, r3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 23:29:04 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcf00) 23:29:04 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000001240), &(0x7f0000001280)=0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10280, 0x0) sendmsg$tipc(r1, &(0x7f0000001200)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x2, {0x4e24, 0x3}}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000012c0)="0569202bab61497b3b18d18a5300fb43f106c93d222020acd3561af76402e6671849364f0e603c807427a392dbb6d04f55369745fa258dc60a84e516966fdc00485a27a9bfd5932bdeb6dd4c8220b578afe58428c7c6643a5ae611da114717e2ae125426215d6a401056540a05d93e2ec4f13f0df8008e99928847238cffe02a3d0ba11a8dc774c176bc71652f2c544d819626820cbf281f5dbfaba64f7f9e4125a9e8f16a2d2de5b58dbf72d29e9efe8390db6efd72eb7c8caade386f4117405972db1b97fa12", 0xc7}], 0x1000000000000013, &(0x7f0000000200)="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", 0xffffffffffffff50, 0x20000041}, 0x200040c0) open_by_handle_at(r1, &(0x7f00000013c0)=ANY=[], 0x4000) accept4$inet6(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x1c, 0x0) r2 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0xfffffffffffffff8) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x5, 0x5, 0x2, 0xd001, 0x9}) 23:29:04 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:04 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = getuid() setresuid(r1, r2, r3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:04 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xff00) 23:29:04 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:05 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x17, 0x4) 23:29:05 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:05 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:05 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x1000000) [ 216.544210][T15907] XFS (loop3): Mounting V4 Filesystem 23:29:05 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000240)={0x9d0000, 0xf1, 0x10001, [], &(0x7f0000000200)={0xa30903, 0x2, [], @value64=0x40}}) rmdir(&(0x7f0000000280)='./file0\x00') r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0xffff, 0x5}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x4}, &(0x7f00000001c0)=0xc) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "91b6c67ab6bf5c277c94821b37724e94a0af390e"}, 0x15, 0x1) [ 216.603285][T15907] XFS (loop3): empty log check failed [ 216.626261][T15907] XFS (loop3): log mount/recovery failed: error -5 23:29:05 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x2000000) [ 216.761512][T15907] XFS (loop3): log mount failed [ 216.816174][T15934] XFS (loop1): Mounting V4 Filesystem [ 216.896263][T15934] XFS (loop1): empty log check failed [ 216.909458][T15934] XFS (loop1): log mount/recovery failed: error -5 [ 216.962601][T15934] XFS (loop1): log mount failed 23:29:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:05 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:05 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:05 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x3000000) 23:29:05 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000140)='.d/3\x00') syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x400600, 0x0) 23:29:05 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4000000) 23:29:05 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 217.441087][T15968] XFS (loop3): Mounting V4 Filesystem [ 217.497042][T15968] XFS (loop3): empty log check failed [ 217.502897][T15968] XFS (loop3): log mount/recovery failed: error -5 23:29:06 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) tee(r1, r0, 0xf22a, 0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x100, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) getsockopt$inet6_buf(r2, 0x29, 0x6f, &(0x7f0000000700)=""/93, &(0x7f0000000780)=0x5d) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)=0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x7}, [{0x2, 0x1, r3}, {0x2, 0x6, r4}, {0x2, 0x5, r5}], {0x4, 0x1}, [{0x8, 0x1, r6}, {0x8, 0x4, r7}, {0x8, 0x3, r8}, {0x8, 0x6, r9}], {0x10, 0x5}, {0x20, 0x4}}, 0x5c, 0x3) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) 23:29:06 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:06 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x5000000) 23:29:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:06 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 217.562912][T15968] XFS (loop3): log mount failed [ 217.891183][T16006] XFS (loop1): Mounting V4 Filesystem [ 217.955518][T16006] XFS (loop1): empty log check failed [ 217.982533][T16006] XFS (loop1): log mount/recovery failed: error -5 23:29:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:06 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:06 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6000000) 23:29:06 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xfffffffffffffffd) r1 = dup(r0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000)=0x1d99dcfb, 0x4) 23:29:06 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 218.043903][T16006] XFS (loop1): log mount failed 23:29:06 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x7000000) 23:29:06 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:06 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:06 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x8000bb06, 0x4000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x1f, 0x2, 0x1, 0x8, 0x0, 0x100000000, 0x20, 0x5, 0x10001, 0x80000001, 0x5000000000, 0x53, 0xffffffffffffffff, 0x1000, 0x10000, 0x2, 0x10001, 0xff, 0x7, 0x10001, 0x80, 0x9df, 0x1, 0x2, 0x8, 0x3, 0x1, 0x400, 0x8, 0x80000001, 0x8, 0x0, 0x57c5474a, 0x1a61c64e, 0x10001, 0x9, 0x0, 0x4, 0x1, @perf_config_ext={0x2, 0x2}, 0x800, 0x7, 0x950, 0xf, 0x3d, 0x8001, 0x5500000000000000}) [ 218.389243][T16036] XFS (loop3): Mounting V4 Filesystem 23:29:07 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) [ 218.439889][T16036] XFS (loop3): empty log check failed [ 218.485409][T16036] XFS (loop3): log mount/recovery failed: error -5 [ 218.562665][T16036] XFS (loop3): log mount failed 23:29:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:07 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x8000000) [ 218.850619][T16074] XFS (loop1): Mounting V4 Filesystem [ 218.872031][T16074] XFS (loop1): empty log check failed [ 218.879070][T16074] XFS (loop1): log mount/recovery failed: error -5 [ 218.962612][T16074] XFS (loop1): log mount failed 23:29:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:07 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x802, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xfffffffffffffffe, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x1, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) 23:29:07 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:07 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x27000000) 23:29:07 executing program 0: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:07 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:07 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x2f000000) 23:29:08 executing program 0: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:08 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xcf) 23:29:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 219.508211][T16107] XFS (loop3): Mounting V4 Filesystem 23:29:08 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x3f000000) 23:29:08 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080)=0x4, 0x4) syz_init_net_socket$ax25(0x3, 0x3, 0xce) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400) [ 219.578540][T16107] XFS (loop3): empty log check failed [ 219.633289][T16107] XFS (loop3): log mount/recovery failed: error -5 [ 219.732696][T16107] XFS (loop3): log mount failed [ 219.853535][T16137] XFS (loop1): Mounting V4 Filesystem [ 219.916503][T16137] XFS (loop1): empty log check failed [ 219.925752][T16137] XFS (loop1): log mount/recovery failed: error -5 [ 219.993432][T16137] XFS (loop1): log mount failed 23:29:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:09 executing program 0: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:09 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x40000000) 23:29:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x6, 0x0) [ 220.381503][T16137] XFS (loop1): Mounting V4 Filesystem [ 220.402917][T16137] XFS (loop1): AIL initialisation failed: error -12 [ 220.462825][T16137] XFS (loop1): log mount failed 23:29:09 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80200) ioctl$TIOCSTI(r0, 0x5412, 0x96) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = inotify_init1(0x80000) fsetxattr(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="73656375726974792e9b4e1b5464a2b2402f70636d432344237000"], &(0x7f0000000080)='cgroup#wlan0.)\x00', 0xf, 0x0) 23:29:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:09 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x46030000) 23:29:09 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(0x0, &(0x7f0000000180)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) [ 220.747587][T16188] XFS (loop3): Mounting V4 Filesystem [ 220.800198][T16188] XFS (loop3): empty log check failed [ 220.824122][T16188] XFS (loop3): log mount/recovery failed: error -5 23:29:09 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xff) 23:29:09 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:09 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x48000000) [ 220.962558][T16188] XFS (loop3): log mount failed 23:29:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:10 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x4c000000) 23:29:10 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(0x0, &(0x7f0000000180)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:10 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:10 executing program 2: syz_init_net_socket$ax25(0x3, 0x800b, 0x7) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x208100, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 23:29:10 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:10 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0xfffffffffffffffc) 23:29:10 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x68000000) 23:29:10 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(0x0, &(0x7f0000000180)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) [ 221.889973][T16248] XFS (loop1): Mounting V4 Filesystem [ 221.962427][T16248] XFS (loop1): empty log check failed [ 222.002508][T16248] XFS (loop1): log mount/recovery failed: error -5 23:29:10 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 222.021610][T16256] XFS (loop3): Mounting V4 Filesystem 23:29:10 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0xff) [ 222.062725][T16248] XFS (loop1): log mount failed [ 222.088838][T16256] XFS (loop3): empty log check failed [ 222.137460][T16256] XFS (loop3): log mount/recovery failed: error -5 [ 222.243354][T16256] XFS (loop3): log mount failed 23:29:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:11 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6c000000) 23:29:11 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:11 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:11 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xcb) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x400000, 0x44) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000180)) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@bridge_getlink={0x20, 0x12, 0x7ffff, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x20}}, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x83001, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r0, r3}) syz_init_net_socket$ax25(0x3, 0x2, 0x6) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e23, @remote}], 0x10) r4 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2c0001) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000040)) 23:29:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:11 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x6d410000) [ 222.947283][T16326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24879 sclass=netlink_route_socket pig=16326 comm=syz-executor.2 23:29:11 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:11 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) [ 223.047625][T16324] XFS (loop1): Mounting V4 Filesystem [ 223.126077][T16324] XFS (loop1): empty log check failed [ 223.147813][T16324] XFS (loop1): log mount/recovery failed: error -5 23:29:11 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0xffffffefffffffff, 0x403) r1 = dup(r0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000c00)={0x4}) [ 223.183249][T16337] XFS (loop3): Mounting V4 Filesystem 23:29:11 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:11 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x74000000) [ 223.230738][T16337] XFS (loop3): empty log check failed [ 223.253525][T16337] XFS (loop3): log mount/recovery failed: error -5 [ 223.282572][T16324] XFS (loop1): log mount failed [ 223.323153][T16337] XFS (loop3): log mount failed 23:29:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:12 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) getpgid(r1) 23:29:12 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x7a000000) 23:29:12 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:12 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x80040000) 23:29:12 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:12 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) semget(0x0, 0x3, 0x10) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x1, 0x1, 0x0, 0x1, 0x844}) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000080)={r0, 0x1, 0xfffffffffffff000, 0x1000000}) [ 224.119718][T16400] XFS (loop3): Mounting V4 Filesystem [ 224.154671][T16393] XFS (loop1): Mounting V4 Filesystem [ 224.198771][T16393] XFS (loop1): empty log check failed [ 224.217456][T16393] XFS (loop1): log mount/recovery failed: error -5 23:29:12 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xc0000000) 23:29:12 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) [ 224.261794][T16400] XFS (loop3): empty log check failed [ 224.280218][T16400] XFS (loop3): log mount/recovery failed: error -5 [ 224.322508][T16393] XFS (loop1): log mount failed [ 224.372582][T16400] XFS (loop3): log mount failed 23:29:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:13 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:13 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:13 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcc000000) 23:29:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:13 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:13 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:13 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcd000000) [ 225.106168][T16454] XFS (loop1): Mounting V4 Filesystem [ 225.142847][T16456] XFS (loop2): Mounting V4 Filesystem 23:29:13 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcf000000) 23:29:13 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 225.196307][T16454] XFS (loop1): empty log check failed [ 225.213457][T16456] XFS (loop2): empty log check failed [ 225.233261][T16454] XFS (loop1): log mount/recovery failed: error -5 23:29:13 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) [ 225.242033][T16456] XFS (loop2): log mount/recovery failed: error -5 [ 225.312852][T16456] XFS (loop2): log mount failed [ 225.322722][T16454] XFS (loop1): log mount failed 23:29:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:14 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:14 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:14 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xf6ffffff) 23:29:14 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) [ 225.697258][T16506] XFS (loop3): Mounting V4 Filesystem [ 225.778155][T16506] XFS (loop3): empty log check failed [ 225.802577][T16506] XFS (loop3): log mount/recovery failed: error -5 23:29:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:14 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(0x0, &(0x7f0000000180)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:14 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xfcfdffff) 23:29:14 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 225.862484][T16506] XFS (loop3): log mount failed 23:29:14 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:14 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(0x0, &(0x7f0000000180)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:14 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:15 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:15 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xfeffffff) 23:29:15 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:15 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(0x0, &(0x7f0000000180)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:15 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xff000000) 23:29:15 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:15 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 23:29:15 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:15 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xfffffdfc) 23:29:15 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:15 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) [ 226.850474][T16577] XFS (loop1): Mounting V4 Filesystem 23:29:15 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 226.916375][T16577] XFS (loop1): empty log check failed [ 226.933087][T16577] XFS (loop1): log mount/recovery failed: error -5 [ 226.978168][T16597] XFS (loop3): Mounting V4 Filesystem 23:29:15 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xfffffff6) [ 227.048293][T16597] XFS (loop3): empty log check failed [ 227.055183][T16577] XFS (loop1): log mount failed 23:29:15 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) [ 227.092960][T16597] XFS (loop3): log mount/recovery failed: error -5 [ 227.202577][T16597] XFS (loop3): log mount failed 23:29:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:16 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:16 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:16 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:16 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xfffffffe) 23:29:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:16 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:16 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:16 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:16 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x1000000000000) 23:29:16 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x100000000000000) 23:29:16 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:16 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:16 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:16 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:16 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x200000000000000) [ 228.178725][T16666] XFS (loop3): Mounting V4 Filesystem [ 228.258174][T16666] XFS (loop3): empty log check failed [ 228.301857][T16666] XFS (loop3): log mount/recovery failed: error -5 [ 228.341365][T16687] XFS (loop1): Mounting V4 Filesystem [ 228.389443][T16666] XFS (loop3): log mount failed [ 228.437000][T16687] XFS (loop1): empty log check failed [ 228.461721][T16687] XFS (loop1): log mount/recovery failed: error -5 [ 228.582976][T16687] XFS (loop1): log mount failed 23:29:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:17 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:17 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:17 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:17 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x300000000000000) 23:29:17 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x400000000000000) 23:29:17 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 229.043999][T16724] XFS (loop3): Mounting V4 Filesystem 23:29:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:17 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:17 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:17 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x500000000000000) 23:29:17 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 229.132201][T16724] XFS (loop3): empty log check failed [ 229.189594][T16724] XFS (loop3): log mount/recovery failed: error -5 [ 229.323012][T16724] XFS (loop3): log mount failed 23:29:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:18 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:18 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:18 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x600000000000000) 23:29:18 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 23:29:18 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:18 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:18 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) 23:29:18 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x700000000000000) [ 230.006384][T16779] XFS (loop1): Mounting V4 Filesystem [ 230.083641][T16785] XFS (loop3): Mounting V4 Filesystem [ 230.100718][T16779] XFS (loop1): empty log check failed [ 230.130212][T16779] XFS (loop1): log mount/recovery failed: error -5 [ 230.156695][T16785] XFS (loop3): empty log check failed 23:29:18 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) 23:29:18 executing program 4: getpid() tgkill(0x0, 0x0, 0x25) [ 230.186662][T16785] XFS (loop3): log mount/recovery failed: error -5 [ 230.212663][T16779] XFS (loop1): log mount failed [ 230.343153][T16785] XFS (loop3): log mount failed [ 230.651758][T16779] XFS (loop1): Mounting V4 Filesystem [ 230.670898][T16779] XFS (loop1): AIL initialisation failed: error -12 [ 230.718957][T16785] XFS (loop3): Mounting V4 Filesystem [ 230.731157][T16779] XFS (loop1): log mount failed [ 230.803260][T16785] ================================================================== [ 230.811600][T16785] BUG: KASAN: use-after-free in xlog_alloc_log+0x126a/0x1390 [ 230.818994][T16785] Read of size 8 at addr ffff88808e302e50 by task syz-executor.3/16785 [ 230.827234][T16785] [ 230.829581][T16785] CPU: 1 PID: 16785 Comm: syz-executor.3 Not tainted 5.2.0+ #56 [ 230.837221][T16785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.847289][T16785] Call Trace: [ 230.850605][T16785] dump_stack+0x172/0x1f0 [ 230.855044][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 230.860091][T16785] print_address_description.cold+0xd4/0x306 [ 230.866125][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 230.871198][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 230.876241][T16785] __kasan_report.cold+0x1b/0x36 [ 230.881198][T16785] ? kvmalloc_node+0x80/0x100 [ 230.885886][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 230.890935][T16785] kasan_report+0x12/0x20 [ 230.895287][T16785] __asan_report_load8_noabort+0x14/0x20 [ 230.900942][T16785] xlog_alloc_log+0x126a/0x1390 [ 230.905844][T16785] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 230.912109][T16785] xfs_log_mount+0xdc/0x780 [ 230.916636][T16785] xfs_mountfs+0xdb9/0x1be0 [ 230.921162][T16785] ? xfs_default_resblks+0x60/0x60 [ 230.926283][T16785] ? init_timer_key+0x13b/0x3a0 [ 230.931177][T16785] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 230.936569][T16785] ? xfs_filestream_get_ag+0x60/0x60 [ 230.941962][T16785] xfs_fs_fill_super+0xcca/0x16e0 [ 230.947018][T16785] mount_bdev+0x304/0x3c0 [ 230.951360][T16785] ? xfs_test_remount_options+0x90/0x90 [ 230.956923][T16785] xfs_fs_mount+0x35/0x40 [ 230.961265][T16785] ? xfs_finish_flags+0x490/0x490 [ 230.966323][T16785] legacy_get_tree+0x108/0x220 [ 230.971123][T16785] ? legacy_parse_monolithic+0x11f/0x180 [ 230.976773][T16785] vfs_get_tree+0x8e/0x390 [ 230.981209][T16785] do_mount+0x138c/0x1c00 [ 230.985565][T16785] ? copy_mount_string+0x40/0x40 [ 230.990535][T16785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.996789][T16785] ? copy_mount_options+0x28d/0x3a0 [ 231.002007][T16785] ksys_mount+0xdb/0x150 [ 231.006266][T16785] __x64_sys_mount+0xbe/0x150 [ 231.010969][T16785] do_syscall_64+0xfd/0x6a0 [ 231.015489][T16785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.021384][T16785] RIP: 0033:0x45c26a [ 231.025290][T16785] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 231.044913][T16785] RSP: 002b:00007f773470ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 231.053341][T16785] RAX: ffffffffffffffda RBX: 00007f773470eb40 RCX: 000000000045c26a [ 231.061334][T16785] RDX: 00007f773470eae0 RSI: 0000000020000000 RDI: 00007f773470eb00 [ 231.069900][T16785] RBP: 0000000000000001 R08: 00007f773470eb40 R09: 00007f773470eae0 [ 231.077885][T16785] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 231.085928][T16785] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 00000000ffffffff [ 231.093949][T16785] [ 231.096317][T16785] Allocated by task 16785: [ 231.100751][T16785] save_stack+0x23/0x90 [ 231.104926][T16785] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 231.110579][T16785] kasan_kmalloc+0x9/0x10 [ 231.114925][T16785] __kmalloc+0x163/0x780 [ 231.119182][T16785] kmem_alloc+0xd2/0x200 [ 231.123531][T16785] xlog_alloc_log+0xbf8/0x1390 [ 231.128313][T16785] xfs_log_mount+0xdc/0x780 [ 231.132842][T16785] xfs_mountfs+0xdb9/0x1be0 [ 231.137356][T16785] xfs_fs_fill_super+0xcca/0x16e0 [ 231.142417][T16785] mount_bdev+0x304/0x3c0 [ 231.146753][T16785] xfs_fs_mount+0x35/0x40 [ 231.151095][T16785] legacy_get_tree+0x108/0x220 [ 231.155872][T16785] vfs_get_tree+0x8e/0x390 [ 231.160299][T16785] do_mount+0x138c/0x1c00 [ 231.164652][T16785] ksys_mount+0xdb/0x150 [ 231.168910][T16785] __x64_sys_mount+0xbe/0x150 [ 231.173595][T16785] do_syscall_64+0xfd/0x6a0 [ 231.179626][T16785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.185531][T16785] [ 231.187883][T16785] Freed by task 16785: [ 231.191962][T16785] save_stack+0x23/0x90 [ 231.196128][T16785] __kasan_slab_free+0x102/0x150 [ 231.201079][T16785] kasan_slab_free+0xe/0x10 [ 231.205612][T16785] kfree+0x10a/0x2c0 [ 231.209513][T16785] kvfree+0x61/0x70 [ 231.213346][T16785] xlog_alloc_log+0xead/0x1390 [ 231.218121][T16785] xfs_log_mount+0xdc/0x780 [ 231.222629][T16785] xfs_mountfs+0xdb9/0x1be0 [ 231.227138][T16785] xfs_fs_fill_super+0xcca/0x16e0 [ 231.232168][T16785] mount_bdev+0x304/0x3c0 [ 231.236509][T16785] xfs_fs_mount+0x35/0x40 [ 231.240868][T16785] legacy_get_tree+0x108/0x220 [ 231.245636][T16785] vfs_get_tree+0x8e/0x390 [ 231.250074][T16785] do_mount+0x138c/0x1c00 [ 231.254413][T16785] ksys_mount+0xdb/0x150 [ 231.258675][T16785] __x64_sys_mount+0xbe/0x150 [ 231.263373][T16785] do_syscall_64+0xfd/0x6a0 [ 231.267901][T16785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.273799][T16785] [ 231.276146][T16785] The buggy address belongs to the object at ffff88808e302dc0 [ 231.276146][T16785] which belongs to the cache kmalloc-1k of size 1024 [ 231.290213][T16785] The buggy address is located 144 bytes inside of [ 231.290213][T16785] 1024-byte region [ffff88808e302dc0, ffff88808e3031c0) [ 231.303582][T16785] The buggy address belongs to the page: [ 231.309228][T16785] page:ffffea000238c080 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0x0 compound_mapcount: 0 [ 231.320182][T16785] flags: 0x1fffc0000010200(slab|head) [ 231.325585][T16785] raw: 01fffc0000010200 ffffea000249d908 ffffea00028fe508 ffff8880aa400c40 [ 231.334192][T16785] raw: 0000000000000000 ffff88808e302040 0000000100000007 0000000000000000 [ 231.342784][T16785] page dumped because: kasan: bad access detected [ 231.349200][T16785] [ 231.351529][T16785] Memory state around the buggy address: [ 231.357165][T16785] ffff88808e302d00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 231.365236][T16785] ffff88808e302d80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 231.373318][T16785] >ffff88808e302e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 231.381386][T16785] ^ [ 231.388077][T16785] ffff88808e302e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 231.396160][T16785] ffff88808e302f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 231.404252][T16785] ================================================================== [ 231.412329][T16785] Disabling lock debugging due to kernel taint [ 231.421497][T16785] Kernel panic - not syncing: panic_on_warn set ... [ 231.428152][T16785] CPU: 1 PID: 16785 Comm: syz-executor.3 Tainted: G B 5.2.0+ #56 [ 231.437175][T16785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.447278][T16785] Call Trace: [ 231.450605][T16785] dump_stack+0x172/0x1f0 [ 231.454960][T16785] panic+0x2dc/0x755 [ 231.458871][T16785] ? add_taint.cold+0x16/0x16 [ 231.463564][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 231.468601][T16785] ? preempt_schedule+0x4b/0x60 [ 231.473465][T16785] ? ___preempt_schedule+0x16/0x18 [ 231.478675][T16785] ? trace_hardirqs_on+0x5e/0x240 [ 231.483720][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 231.488810][T16785] end_report+0x47/0x4f [ 231.492986][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 231.498022][T16785] __kasan_report.cold+0xe/0x36 [ 231.502888][T16785] ? kvmalloc_node+0x80/0x100 [ 231.507583][T16785] ? xlog_alloc_log+0x126a/0x1390 [ 231.512654][T16785] kasan_report+0x12/0x20 [ 231.516997][T16785] __asan_report_load8_noabort+0x14/0x20 [ 231.522665][T16785] xlog_alloc_log+0x126a/0x1390 [ 231.527536][T16785] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 231.533796][T16785] xfs_log_mount+0xdc/0x780 [ 231.538331][T16785] xfs_mountfs+0xdb9/0x1be0 [ 231.542861][T16785] ? xfs_default_resblks+0x60/0x60 [ 231.547990][T16785] ? init_timer_key+0x13b/0x3a0 [ 231.552946][T16785] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 231.558349][T16785] ? xfs_filestream_get_ag+0x60/0x60 [ 231.563655][T16785] xfs_fs_fill_super+0xcca/0x16e0 [ 231.568702][T16785] mount_bdev+0x304/0x3c0 [ 231.573042][T16785] ? xfs_test_remount_options+0x90/0x90 [ 231.578597][T16785] xfs_fs_mount+0x35/0x40 [ 231.583022][T16785] ? xfs_finish_flags+0x490/0x490 [ 231.588090][T16785] legacy_get_tree+0x108/0x220 [ 231.592868][T16785] ? legacy_parse_monolithic+0x11f/0x180 [ 231.598554][T16785] vfs_get_tree+0x8e/0x390 [ 231.602988][T16785] do_mount+0x138c/0x1c00 [ 231.607352][T16785] ? copy_mount_string+0x40/0x40 [ 231.612396][T16785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.618652][T16785] ? copy_mount_options+0x28d/0x3a0 [ 231.623871][T16785] ksys_mount+0xdb/0x150 [ 231.628128][T16785] __x64_sys_mount+0xbe/0x150 [ 231.632833][T16785] do_syscall_64+0xfd/0x6a0 [ 231.637438][T16785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.643337][T16785] RIP: 0033:0x45c26a [ 231.647233][T16785] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 231.666842][T16785] RSP: 002b:00007f773470ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 231.675264][T16785] RAX: ffffffffffffffda RBX: 00007f773470eb40 RCX: 000000000045c26a [ 231.683249][T16785] RDX: 00007f773470eae0 RSI: 0000000020000000 RDI: 00007f773470eb00 [ 231.691253][T16785] RBP: 0000000000000001 R08: 00007f773470eb40 R09: 00007f773470eae0 [ 231.699490][T16785] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 231.707471][T16785] R13: 00000000004c8925 R14: 00000000004df5e8 R15: 00000000ffffffff [ 231.716814][T16785] Kernel Offset: disabled [ 231.721147][T16785] Rebooting in 86400 seconds..