ffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @remote, 0x9}, 0x1c) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x2, {0xcc, 0x100000000, 0x8, 0x1ff, 0xdcc}, 0x1, 0x7}, 0xe) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="b876dcd737a58f11af8d47d1babb68e2d7e615b2a5d8d0f8ff75536fe765364e6516a2480f58c6d0ae1ce2d55014358ff666503d0dff7aa13509febea3eb99534ac0d9866db85ac13e4ab647b491e5d2496ee4ff5835af407184088ab68310561750d4ae2e4cb5013b032663bb68b7b769ba04fd86eb5158a97901fa33ad5daaa153a3423cfb34c0800f97ec10c417cab0aedd448c52635db90ae24091ebbeabcddf56b046b553f193a475f0c794c807fbe138e23b843e7dac43e9ec0fba", @ANYPTR, @ANYRES16], 0xc8) [ 469.777846][ T4266] XFS (loop3): Invalid superblock magic number 19:23:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1c, 0x0, 0x0, 0x0, 0x0) 19:23:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:23:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3!$./file0\n'], 0x3138) io_setup(0xffffffffffffc82e, &(0x7f0000000000)=0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x60000, 0x20) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, &(0x7f0000000080)="8f3600d50fb1de72dec29c2f33200a78cbc281e0cf8c5684c5615bff377ad2f162775cb64348946da8b9fd42a33ad95577e0cfc6330b8a78b8dc5e242b776b0bd6bd07c3e736904fb75741b8af9970541b16abda2671813c7c4439a4a6f12096052ea01cb4408982e06683e515c3d65049ba33f8100738f363c29d77f61700c5c48c52f73666bf5843df8852dee07b365c4cb52923aeda3c7a282f61c15b38af023d5c976644f9ccdfc498314a7eba7c7c7c590921afe86f0813cf3b04f387b9b5600ac40fbfad137f8555e94898f664cbc66a993e2f120ae980f2665784f1", 0xdf, 0x3, 0x0, 0x2, r3}, &(0x7f0000000200)) [ 470.083913][ T4284] XFS (loop1): Invalid superblock magic number 19:23:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000100000002, 0x0) sendmmsg(r1, &(0x7f0000002000)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}, {{&(0x7f00000009c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x303000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x9, @empty, 0x2}, @in6={0xa, 0x4e22, 0x8, @empty, 0x39}, @in6={0xa, 0x4e21, 0x1fe000000, @empty, 0x2}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e23, 0x1ff, @mcast2, 0x3}], 0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x3, 0x8, 0x1, 0x9, 0x0, 0x9, 0x4000, 0x1, 0xfffffffffffffffd, 0x4, 0x100, 0xf2, 0x400, 0x3, 0x3f, 0xfff, 0x5, 0x71c, 0x4, 0x40, 0x3, 0x8000, 0x0, 0x4, 0x0, 0x5b, 0x0, 0x2, 0x9, 0x80000000, 0x10001, 0x6, 0x1, 0xfe9, 0x428, 0x8, 0x0, 0x100000001, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x1200, 0x13c, 0x0, 0x9, 0x7, 0x9a40, 0x8}, r3, 0x9, r0, 0xf) 19:23:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:23:48 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f00000009c0)=""/240, 0xf0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x3138) 19:23:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:23:48 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f00000009c0)=""/240, 0xf0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="33212026d306696c65300a"], 0x3138) 19:23:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 470.410874][ T4406] XFS (loop3): Invalid superblock magic number 19:23:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x23, 0x0, 0x0, 0x0, 0x0) 19:23:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:23:48 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f00000009c0)=""/240, 0xf0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 470.928744][ T4647] XFS (loop1): Invalid superblock magic number 19:23:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8000, 0x1) 19:23:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) accept$netrom(r1, &(0x7f0000000080)={{}, [@netrom, @netrom, @null, @default, @netrom, @bcast, @default, @bcast]}, &(0x7f0000000100)=0x48) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:49 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:23:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:23:49 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = semget(0x1, 0x4, 0x10a) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x2801) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000180)=0x13, 0x4) semctl$IPC_INFO(r2, 0x0, 0x3, &(0x7f0000000080)=""/246) sync_file_range(r0, 0x8, 0x24917152, 0x3) ioctl$UI_DEV_DESTROY(r1, 0x5502) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321765a530a6ce1ecd17d"], 0x3138) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f00000001c0)={0x8, 0x3}) 19:23:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 471.437240][ T4698] XFS (loop3): Invalid superblock magic number 19:23:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x28, 0x0, 0x0, 0x0, 0x0) 19:23:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x490600, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:49 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 471.757229][ T4819] XFS (loop1): Invalid superblock magic number 19:23:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:23:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) fremovexattr(r0, &(0x7f0000000000)=@random={'system.', '3! '}) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:50 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, 0x0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000080)=0x84) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="33318dbaba9a8e4c990000cf7d26f00b93f4ea2647d064f8a6b488af38ef6b0bd343f13fdc9c0b5afbba4aca510afcfd8dca373642bd1049a33982fe9f4129ae743ca6b063aa61db0108767bba73ce9845dd67111450bf46088d72fdf6efecdea7a6135680edff0dc41baf"], 0x3138) r1 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x2, 0x614000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000200)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xb0, "769d1daea40caa707bc647102a791d856953dfd7e44f674aa202732cb3665cf65a76eec6bc0322b896c8d828be13dddbba147a268057a721c22fe6438d4429dda29f500b0959b51927806dd6de962f5f9bfdbe512fd79fad6469b2ac0338cf767e40dbf9aac0830e734ee5ef8aaf350aa41d6cecbd0f5f9a3d2d4454a2a27f42ae1756ee91c8bc51ff47837d6ecc1ea05fcddccec861c4ce456f02ab3e3e790448d4df7e2876486a3c7f5bdf2b4fe4a2"}, &(0x7f0000000000)=0xb8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x8, 0x8d4, 0x4, r2}, 0x10) 19:23:50 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, 0x0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:23:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:50 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, 0x0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 472.324621][ T4986] XFS (loop3): Invalid superblock magic number 19:23:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:23:50 executing program 2: r0 = shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x7000) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x2080) getdents(r1, &(0x7f0000000080)=""/155, 0x9b) shmdt(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = socket$inet(0x2, 0x1, 0x7) accept4$inet(r1, 0x0, &(0x7f0000000000), 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2000, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f00000000c0)={0x10, 0x0, 0x7ff}, 0x10) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x8, 0x2, 0xffa27304a8c84c25}, 0x4) 19:23:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x32, 0x0, 0x0, 0x0, 0x0) 19:23:51 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:23:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x3, 0x70, 0x0, 0x7, 0x8001, 0x200, 0x0, 0x800, 0x80000, 0x2, 0x100, 0xe3, 0x7, 0x6d98, 0x0, 0x55, 0x6, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffff7f, 0x273, 0x800, 0xfff, 0x8001, 0x0, 0x6, 0xffffffff, 0x9a5, 0x364, 0x0, 0xfffffffffffffffd, 0x7f, 0x7f, 0x81, 0x0, 0x9, 0x0, 0x8000, 0x3, @perf_bp={0x0, 0xd}, 0x1, 0x3, 0x101, 0x0, 0x500000, 0x8, 0x4}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r3, r1, 0x0, 0x0, 0x0}, 0x30) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(r4, &(0x7f0000000000)={0x4}, 0x8) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r6 = fcntl$getown(r4, 0x9) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x4, 0xe5b8, 0x8, 0x7f, 0x0, 0x5, 0x40000, 0x5, 0x8, 0x4, 0x80, 0x3, 0xffffffff, 0x5, 0x2, 0x2, 0x25e3, 0xfffffffffffffffd, 0x1, 0x3ee0, 0x3, 0xffffffffffffff1e, 0x4, 0xfff, 0xb4, 0x4, 0x100, 0x1ff, 0x8, 0x3, 0x1, 0x3, 0x40, 0x6, 0x2, 0x0, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x11, 0x8000, 0x2, 0xc, 0x9, 0x7fffffff, 0x5d}, r6, 0xc, r4, 0x1) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="33216c65e36a58918b300a002e000000dcc94dc144ee2eebbe06eb7204c048d6fef0672d77c1b67682b9d36c0ed43dfce2697efc4880ac20266d84f0182ac0d72bfb21db6566abcfe687c886a3692e7d3e6898b809bda9129fb40441d919a845fd7d21dc045e8db8138097350a36d445a8168c9b193f5105318f524c0ab9615c0685f9ce18651d7ab5302a61a6868801ab1e1f1cab5c33a4e0197d130712c2bd3945f6abec202bae8d8fb8c6ac3f32dda9b3376141ad1cdfd0d738d8dbbb64f19e05a292adefc287603141e67ca60b710afaf26ffdf2797fd7b989b53322e03d3030bf39c83ba8cc0112da76169cb7c74a4f55f3a9fafd6e0254243051"], 0x3138) prctl$PR_CAP_AMBIENT(0x2f, 0x5, 0x4) 19:23:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = socket$inet6(0xa, 0x5, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={r1}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x617, @remote, 0x128a}], 0x1c) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10001, 0x2000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000080)=0x5004) 19:23:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:23:51 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 473.150988][ T5214] XFS (loop1): Invalid superblock magic number 19:23:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 473.201851][ T5219] XFS (loop3): Invalid superblock magic number 19:23:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:51 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:23:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=""/250, &(0x7f0000000000)=0xfa) pkey_alloc(0x0, 0x1) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="0000040000000000000000"], 0x3138) 19:23:52 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, 0x0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:23:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 19:23:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4003, &(0x7f0000000000)=0x1, 0x7fff, 0x0) poll(0x0, 0x0, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x7a9f1493fb016ca) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="cee1eaf206a6f28967300abd1d17cb02ea4d8c160cb7e68c4afa7ac2756408f895c3075b12234ba8089b4a828ae9d3d7491c2dc38b04dfae8f760658eb76d35d87b86ee3b5ea5f7c014cf6d8669aa57126a5acd6843b89c4feee13950017b12a08982368221ec7ec61c2c241e8ebcd05780b3eea4cb831460bd3e3c7a3f7982d9c1819d53495ca4c549b25fbc6b895f2ae20e204c5023555c5bd4f48f95e3c74c1991f5d3e5c3e4a"], 0x3138) 19:23:52 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, 0x0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:23:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3fffc000000, 0x2, 0xff, 0x4, 0x80, 0x400}, &(0x7f0000000080)=0x20) [ 474.255788][ T5386] XFS (loop1): Invalid superblock magic number [ 474.265201][ T5395] XFS (loop3): Invalid superblock magic number 19:23:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:23:52 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, 0x0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:23:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x8, 0x0, 0x9, 0x1, 0x0, 0x5, 0x34442, 0xc, 0x800, 0x61d, 0x1c780c1a, 0x1000, 0x0, 0x401, 0xff, 0xfffffffffffffffb, 0x8, 0x9, 0x7, 0x5, 0x0, 0x0, 0x8, 0x2, 0x5, 0x0, 0x0, 0x2, 0x3, 0x2, 0x3, 0x1f, 0x81, 0x6, 0x4, 0x9, 0x0, 0x7693, 0x1, @perf_config_ext={0x20, 0xffffffffffffffe0}, 0x10, 0x1f, 0x7fffffff, 0x5, 0xef3a, 0x0, 0x9}, r1, 0x4, r0, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="336e4c1c78dff8ee8700e0edad7161202e2f66696c0a00000000000000000000"], 0x3138) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f00000001c0)=0xc) ioctl$int_in(r2, 0x5421, &(0x7f00000000c0)=0x1) 19:23:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40280, 0x0) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x1, @mcast1, 0x4}, 0xfffffffffffffe85) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="3321c6822f66696c08300af4e3cfd36445b1d16c3c3889e5afe2c82d8117cb2d5b06b68d01e6500ad3b07620424fa4e37541"], 0x3138) 19:23:53 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(0x0, 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4c, 0x0, 0x0, 0x0, 0x0) 19:23:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:23:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 475.211446][ T5660] XFS (loop1): Invalid superblock magic number 19:23:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) 19:23:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 475.276725][ T5672] XFS (loop3): Invalid superblock magic number 19:23:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:23:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x25}, 0x1f}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(r0, &(0x7f0000000080)="65c78b751979310a77ff3ec9f9a2f6e72982e8eccada9a22d8c9487b0af4db69522862453f7c59d46dd906d75fc12fc499bb27965f6e39f221c61fca03a80681be0a9389e399008080d5a3ae0a8ad3cc6a55eedde6548e2aba44b23445e50d2a9b7f5199d61f895bf7fedc69470916c35d55fc0f7b4aa51a1af8089c2b47a7d5071a6d261e0cacda7eca2234f992570bc502c176289ebd5a74d0e047a974c06b36291e37c13ba2ccf79a412c21538a18cba4e351230e0f49cef0259c9501221d0a4f9eb0d6caa227f253093cf9ae1f8208768a", 0xd3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r1, 0x0, 0x3, &(0x7f00000001c0)='3! ', 0xffffffffffffffff}, 0x30) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:23:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x2, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e2f66030000000a"], 0x3138) 19:23:54 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(0x0, 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:23:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e2f66696c65f722b73bf3294613df103e75f7c30df1ec24fc340a"], 0x3138) 19:23:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$KVM_SMI(r0, 0xaeb7) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4e, 0x0, 0x0, 0x0, 0x0) [ 476.057849][ T5932] XFS (loop3): Invalid superblock magic number 19:23:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:23:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000700)={@dev, 0x0}, &(0x7f0000000740)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000780)={@mcast1, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3, 0x8, 0x5, 0x500, 0x3, 0x210020, r1}) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffc00, 0x200) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) [ 476.284428][ T6048] XFS (loop1): Invalid superblock magic number 19:23:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:23:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:54 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x60080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000480)={0x13, 0x10, 0xfa00, {&(0x7f0000000580), r1, 0x1fffffffffffffd}}, 0x18) setsockopt$inet_dccp_buf(r0, 0x21, 0xcd, &(0x7f00000004c0)="1eddb0fde6e843f4fa9ea9762225bba067cc78b00525db430087227659c1498cde7e9d0cfcd973370f8b69a9a4285a18827b8530a5c6d0ad96db8d7ec8130917a4a5e9103c6e3b9c80e9f98677be0283c937ab3cad14a46beccb0aff4ee0e6751cc9a05ed60936ffb67f3df862eee0f977a09e105e3df53d373d122606927a19943574283b50b90669dbc66f2a5049e57c3d64de4e5b6c835017edce39ba87b64d218fe78e5c36c6140e6e0547db5bd0a49734", 0xb3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x200000000, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @empty, 0x3}, {0xa, 0x4e23, 0xe6e, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, r4, 0xffff}}, 0x48) 19:23:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e21, 0x2, @mcast1, 0xca}, {0xa, 0x4e20, 0x9, @mcast2, 0x400}, 0x20, [0x68, 0x40, 0xcf66, 0xe7e, 0x4, 0xff, 0x4, 0x7]}, 0x5c) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000140)={@host}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="33398b4f107200c700804d"], 0x3138) 19:23:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) [ 476.979307][ T6213] XFS (loop3): Invalid superblock magic number 19:23:55 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(0x0, 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:23:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x60, 0x0, 0x0, 0x0, 0x0) 19:23:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) 19:23:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:23:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x25, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x60040, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x200, 0x6, 0x7, 0x0, 0x9, 0x1, 0x5, 0xc99, 0x81, 0x400}) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xb) [ 477.148688][ T6318] XFS (loop1): Invalid superblock magic number 19:23:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x1d7) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @loopback}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41210400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@ipv4_deladdr={0x90, 0x15, 0x300, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x2, 0xc8, r2}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IFA_BROADCAST={0x8, 0x4, @rand_addr=0x1f}, @IFA_LABEL={0x14, 0x3, 'bond_slave_0\x00'}, @IFA_LABEL={0x14, 0x3, 'rose0\x00'}, @IFA_ADDRESS={0x8, 0x1, @local}, @IFA_FLAGS={0x8, 0x8, 0x200}, @IFA_LABEL={0x14, 0x3, 'ip6erspan0\x00'}, @IFA_FLAGS={0x8, 0x8, 0x20}, @IFA_LABEL={0x14, 0x3, 'ip_vti0\x00'}]}, 0x90}}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 477.572112][ T6552] XFS (loop3): Invalid superblock magic number 19:23:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="332120616566f9052e0000"], 0x3138) 19:23:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:23:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) pwrite64(r0, &(0x7f0000000080)="92918fe8e80f216fc28ef9a573ea20fe5eabf34bb76d2b14b0209426578772cf6fa98d65413ee8ff4bfbda6efdcf6cfb075636ee316b741132b6f034f5b4fd7722e3519e3594e23c0b1f6e5bde5602a97c09841b5923", 0x56, 0x0) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:56 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x68, 0x0, 0x0, 0x0, 0x0) 19:23:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:23:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1, 0x0) getsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 478.194574][ T6588] XFS (loop3): Invalid superblock magic number 19:23:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e2f66697445020000000000000000f85ee5363e49c4e609606aa156a3bc22c31aac9193ebeb49e073e2fa497776d28a210e1026ee920820547bf7"], 0x3138) r1 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='\x00', 0xfffffffffffffff8) keyctl$clear(0x7, r1) [ 478.249615][ T6583] XFS (loop1): Invalid superblock magic number 19:23:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:23:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:23:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x11) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x20, 0x0, 0x1, 0x7}, 0x8) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() setgroups(0x2, &(0x7f0000000140)=[r2, r3]) 19:23:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000013b4b9c9078f460ed992d3b063aa9cb76781d3d634561e161f2376de36f7f3af797376c11fbd729313bb9b70aa0503286c1d67b0222b876733e3b5b0595c9bde94ecd12f2c2e977a583f63049c173b5b759764901fce7468c47bcdd4d9a3fabed573e7945a540aaa568f4554f1f3b45920"], 0x3138) 19:23:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:23:57 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 479.036980][ T6858] XFS (loop3): Invalid superblock magic number 19:23:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) 19:23:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:23:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f00000000c0)={'3! ', './file0', [{0x20, '\\'}, {}, {0x20, '\''}, {0x20, '3! '}, {0x20, 'trusted{'}, {0x20, 'GPLposix_acl_access'}, {0x20, '3! '}, {0x20, '3! '}], 0xa, "7dcc6aea861efabaeadd1e98b8cd32b81f0dee968f4ff246fe9084859192e00ad457ac374497474aa2d44f40dcedeff0089431d70ae62cf659d5b160e93ba2555e45d0f69d498b7e3ecfd337326b9804d89974df8f9858ba54d9d0c43c798f258883560a36499ccdfcee81a28a460ef82a77f61351b22fe3"}, 0xb1) 19:23:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="3321202e2f66e44b8b847442a973a0fb2d33abeb73ed1d4fabbbd24c98ff6e8caecca9347001f9fb2dfc2afcd3b9606f752d7c964c76dfda7e6642f3320505210504a1410d34a9e81e104663f00403445288521977fbd99ef796c9bf652f80798f9f6e925e37d92b5a118a767d9c710f1126d0b8e63fafa11e8e1488d873dcbbae5d036b287bbd12470c62983cadf0eee6ba6e6ddd05aba2b0f1075145a5f1e1ad4fad23c60cda412d62fa9b83fc18acd0cca90191c85307ff3e7197b63bec59e3f208c4e0edb9f7ca6881acbf4fcb61af2b84664d387520c8815a8b3bb29d037e325453f79ab8f20a722257a6d8509079"], 0x3138) 19:23:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:23:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200000) rt_sigtimedwait(&(0x7f0000000100)={0x8}, &(0x7f0000000980), &(0x7f0000000a00), 0x8) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000080)=0x5) connect$inet6(r1, &(0x7f0000000940)={0xa, 0xfffffffffffffffe, 0x9c49, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="f4671cc42f66696c65300a31669988ac6c15fed1a24bbfc71ef712d43de97db2fd84d6927e96b58ad2d428f443e6095e3a444609ef92f924fae935ae32eda302fa84c88e6428fc26f0cb0cee5b01b50031b75d22f2245912e676e25f8625019b6c468338"], 0x3138) write$binfmt_elf64(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0xfff, 0x4, 0x5, 0x6, 0x2, 0x3, 0x3, 0x1ff, 0x59, 0x40, 0x281, 0x1, 0x1e79, 0x38, 0x2, 0x0, 0x0, 0xfff}, [{0x6474e553, 0x9, 0x6, 0x9, 0x7ff, 0x6, 0x3, 0x8000}], "b1a54cfb45aad2b6988041f06d8ab1973e8e0c587ae1915d627991b7a726f94fb1", [[], [], [], [], [], []]}, 0x699) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000140)={0x800, 0xc3, 0x200, 'queue0\x00', 0xb6}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5, 0x3, 0x8, 0x3}]}) 19:23:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 479.415005][ T6982] XFS (loop1): Invalid superblock magic number 19:23:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:57 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:23:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f0000000180)=""/159, 0x9f}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f00000003c0)=""/1, 0x1}, {&(0x7f0000000400)=""/248, 0xf8}, {&(0x7f0000000500)=""/222, 0xde}], 0x7) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000100)={0x7, r2, 0x1}) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x80800) 19:23:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x74, 0x0, 0x0, 0x0, 0x0) 19:23:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:23:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @remote, 0x9}, 0xb) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x80000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, '+securitycpuset\'vboxnet0*'}}, {@cache_none='cache=none'}, {@version_u='version=9p2000.u'}, {@version_9p2000='version=9p2000'}, {@cache_mmap='cache=mmap'}], [{@context={'context', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, ':\'*'}}, {@fowner_gt={'fowner>', r3}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@pcr={'pcr', 0x3d, 0x14}}, {@subj_type={'subj_type', 0x3d, '3! '}}, {@audit='audit'}, {@fowner_lt={'fowner<', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x31, 0x37, 0x32, 0x33, 0x62, 0x73, 0x77], 0x2d, [0x37, 0x66, 0x64, 0x61], 0x2d, [0x38, 0x77, 0x58dfe24d6d9e3fa, 0x77], 0x2d, [0xde76ae86df74bb1b, 0x65, 0x76], 0x2d, [0x36, 0x37, 0x73, 0x38, 0x71, 0x36, 0x34, 0x62]}}}]}}) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @remote, 0x9}, 0x3e5) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="33acf1fcad8a6094a10e5d"], 0x3138) 19:23:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) [ 480.082798][ T7206] XFS (loop3): Invalid superblock magic number 19:23:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:23:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x38) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 480.198238][ T7242] XFS (loop1): Invalid superblock magic number 19:23:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202ef18c7c305bb6bb5f8e79fa149f3fb89cb0086f0c7538f1f063f80f4db6df7b2ffe7fc906"], 0x3138) 19:23:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:23:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x8000000, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3! ./]il\f0\n'], 0x3138) r2 = dup3(r0, r0, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f00000000c0)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) bind$tipc(r3, &(0x7f0000000080)=@id={0x1e, 0x3, 0x0, {0x4e21, 0x3}}, 0x10) 19:23:58 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 480.681647][ T7389] XFS (loop1): Invalid superblock magic number [ 480.940272][ T7434] XFS (loop3): Invalid superblock magic number 19:23:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x7a, 0x0, 0x0, 0x0, 0x0) 19:23:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:23:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xd8, 0x200) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:59 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:23:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:23:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x200800) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xe4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r2) socket$nl_route(0x10, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 481.386893][ T7541] XFS (loop1): Invalid superblock magic number 19:23:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:23:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:23:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000080)) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000580)=[0xee01, 0xee00, 0xee01]) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) r5 = getegid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dsp\x00', 0xa2400, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0}, &(0x7f0000000940)=0x14) ioctl$HCIINQUIRY(r7, 0x800448f0, &(0x7f0000000980)={r8, 0x80000000, 0x4, 0x8, 0x8, 0x7fff, 0x8}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$rfkill(r7, &(0x7f00000009c0)={0x80000001, 0x4, 0x2, 0x1}, 0x8) setgroups(0x7, &(0x7f0000000880)=[r2, r3, r4, r5, r6, r9, r10]) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="5e5c74e98c17d50002300a84cfcbec2753144470b3e1ddfb0b5e1b8cc83fc9416d8f1e48840f4883294a7802b489085ffffffbb0911e80afacf162a9b9961233511f33fa782601b3e2fb9003cbe5e5309fbb008000000000000098b7efae622f860cef3b4035bec26f601ad6bfc1f61907095333aa146659f79b0248f5"], 0x3138) 19:23:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffff9c, 0x6, 0x16, &(0x7f00000000c0)=[@window={0x3, 0x80, 0xe491}, @timestamp], 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='net/dev\x00') connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:23:59 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xc4, 0x0, 0x0, 0x0, 0x0) 19:24:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x117, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000003c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000440)={0x1, "d0a4ac9bd669198ad1d4f26a377fd91a2cf92c61ee1e32c25b8035cd9546b79b", 0x1, 0x2, 0x7, 0x7, 0x8, 0x3, 0x7fffffff, 0x7}) ioctl(r0, 0x1, &(0x7f0000000140)="84562237b80632db5abc12d4bfd02fdce1de02161f6548b2ee70ed46c9d358b3ebf6e7a4426497d226ad01212f560cb94fb1ecaa063acd3fedb6fc44cf833d8c6147a6bea307210d8d25087774e55a23693432780f1338beaf791060") r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x4, @remote, 0x9}, 0x1c) r4 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000300)={0x401, 0x7}) write$binfmt_script(r3, &(0x7f0000002ec0)=ANY=[@ANYBLOB], 0x3138) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x6, 0x4}, &(0x7f0000000080)=0xc) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x2000, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000400)=0x6, 0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r6, 0x111, 0x5, 0x80000000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r6, 0xc0945662, &(0x7f0000000200)={0x0, 0x0, [], {0x0, @bt={0x0, 0x4274, 0x0, 0x2, 0x40, 0x6, 0x268, 0x6, 0x9, 0x8000, 0x7f, 0x0, 0x9, 0x9, 0x10, 0x8}}}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r5, 0x7fff}, &(0x7f0000000100)=0x8) 19:24:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 482.045607][ T7739] XFS (loop3): Invalid superblock magic number 19:24:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80200, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x70000004}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3! e0\n\x00\x00\x00\x00\x00'], 0x3138) [ 482.210073][ T7843] XFS (loop1): Invalid superblock magic number 19:24:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) fcntl$dupfd(r0, 0x0, r1) timer_create(0x7, &(0x7f0000000240)={0x0, 0x41, 0x4}, &(0x7f0000000280)=0x0) timer_gettime(r2, &(0x7f00000002c0)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80000) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000180)={'broute\x00', 0x0, 0x3, 0x18, [], 0x9, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/24}, &(0x7f0000000200)=0x78) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x2, @dev={0xfe, 0x80, [], 0x1f}, 0x3d4b}, 0x1c) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x3138) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001600)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001640)={@mcast2, 0x74, r4}) 19:24:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa82, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, 0x4) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:00 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 482.689936][ T7984] XFS (loop1): Invalid superblock magic number [ 482.989331][ T8062] XFS (loop3): Invalid superblock magic number 19:24:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xca, 0x0, 0x0, 0x0, 0x0) 19:24:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000140)={'nr0\x00', 0x7fff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) r2 = socket$inet6(0xa, 0x3, 0x3c) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000180)={0x0, 0x8, 0x9, 0x4, 0x5, 0x8}) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000000000)={'3! ', './file0', [], 0xa, "1c374bea0400e3c675bcd6"}, 0x16) 19:24:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xffffff32) 19:24:01 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @multicast2}}, [0xf7, 0x0, 0x9, 0x200, 0x3, 0x1c83f90e, 0x6, 0x7, 0x1, 0x400, 0x3, 0xfffffffffffffffc, 0xfffffffeffffffff, 0x3ff, 0x4]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0x1d, "ae2e9505ddeb2761a52550167e50cca6bbce8037c59b52ebca440ee875"}, &(0x7f0000000200)=0x25) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 483.384813][ T8197] XFS (loop1): Invalid superblock magic number [ 483.489661][ T8323] XFS (loop3): Invalid superblock magic number 19:24:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0xfffffffffffffffe, 0x0) readahead(r1, 0x9, 0xffffffffffffffff) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000080)={[0x2, 0x15001, 0x2, 0x6000], 0x0, 0x1, 0xffffffff}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x8, 0x400680) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:02 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x40000000000000, @empty, 0x9}}, [0x7548, 0x4, 0x9, 0x20000000000000, 0x101, 0x5, 0xd61, 0x400, 0x7ff, 0x0, 0x42, 0xda0000000000000, 0xd0a, 0x8, 0x9]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000280)={r1, 0x4, 0x0, 0x200, 0x1200000}, &(0x7f00000002c0)=0x18) perf_event_open(&(0x7f0000001380)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000001440)=ANY=[@ANYBLOB="2321202e2f6f632f636170692f0600000032306e636369000af6e0f70b8eda10b207713f2f1c"], 0x30) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001400)={r2, 0x8}, 0x8) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000001340)={0x40, 0x0, &(0x7f0000000340)="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", {0x7, 0x5, 0x7f7f7f5f, 0x3, 0x6, 0x2, 0x5, 0x817}}) r3 = socket$inet6(0xa, 0x3, 0x3c) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000300)={0x20, 0x10000, 0x7, 0x5, 0x2, 0x7}) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="3321202e2f66696c65300a5805fdc1cbeb9ee4a0012b65a2b78428d5fcf6c684482240e2830ecee6f72234251fe5a0239d366341ec5d2cb4c4f0e78936869be34bcfb03c99097dbc2f9116b3ba8ef350d226bcf878987ef536687b44696aa7c44881d94cb0dba9fb34ec5b9272bc323a56c2c343cfb580239361f078e69ee678a82cb6cdab36a89d742efc71f35bb9998e6ea58996e0f66d982eb6b0bb"], 0x9d) 19:24:02 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xf0, 0x0, 0x0, 0x0, 0x0) 19:24:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:24:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e2f66696c65300ad567"], 0x3138) 19:24:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8001, 0x600100) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0x2, &(0x7f00000000c0)=0x4) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 484.225399][ T8493] XFS (loop3): Invalid superblock magic number 19:24:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) bind$x25(r1, &(0x7f0000000080)={0x9, @remote={[], 0x0}}, 0x12) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 484.491764][ T8636] XFS (loop1): Invalid superblock magic number [ 484.972858][ T8794] XFS (loop1): Invalid superblock magic number 19:24:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x600, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:03 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x0, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x15, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0x200, 'syz0\x00'}) mq_open(&(0x7f0000000000)='3! ', 0x40, 0x40, &(0x7f0000000080)={0x0, 0x8, 0xb3, 0x7ff, 0x2, 0x4, 0x6a1, 0x8}) [ 485.218879][ T8817] XFS (loop3): Invalid superblock magic number 19:24:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4000000003f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x136, 0x0, 0x0, 0x0, 0x0) 19:24:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7, 0x10000) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000080)={{}, "4db0b655643408dc986770096e454ebb9748ad03bd42dc4e60743aea9c780d4e", 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x4) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x4000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x100000001, @ipv4={[], [], @empty}, 0x100}}, [0x10ff, 0x400, 0xffffffffffffff7f, 0xca, 0x1ff, 0x2, 0x1, 0x8, 0x7e, 0x3, 0x2, 0x10001, 0x6, 0xfffffffffffeffff, 0x2]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x30, 0x401, 0x4}, &(0x7f0000000200)=0x18) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, r2, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x103000, 0x0) r3 = socket$inet6(0xa, 0x200000000000007, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) write$binfmt_script(r3, &(0x7f0000002ec0)=ANY=[@ANYBLOB="009f"], 0x3138) 19:24:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 485.654176][ T8954] XFS (loop1): Invalid superblock magic number 19:24:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='y\x00\x00\x00/file0\n'], 0x3138) 19:24:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:04 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x0, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x802) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in={{0x2, 0x4e24, @rand_addr=0x1}}, 0x4, 0x8, 0xfffffffffffff396, 0x3f, 0x10}, &(0x7f0000000200)=0x98) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="0400f8ff3e66696c65300a"], 0x3138) 19:24:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x4, 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000000080)={'3! ', './file0', [], 0xa, "a057b8c05a93b931c4b621704a0ffc331eb1655fa409241e398dce008c35ea0460f70adf30945cc9cc24b1871368bdf8af8273e2d97d3b21ba54d1a2bb16f20645d817e73339df983197ed34283a7217e96c222772d09839da2fb214fe65199c17ec3b9d87dc6ce879a855373a1397640db4de96b0cd592f201d512f23d4c66de63776b7785d59d0f214f29d81cb"}, 0x99) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) [ 486.087017][ T9160] XFS (loop3): Invalid superblock magic number 19:24:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x140, 0x0, 0x0, 0x0, 0x0) 19:24:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x400000) 19:24:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x6, @local, 0xfffffffffffffffa}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000100)=""/71, &(0x7f0000000000)=0x47) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="b99176c540454e2f743db2a75aea02a084d9d2dd60f29760c861fc8deb7b6799c8ccd3e94deca84f0b58512d31db923daa7ee2f0b8b15ad4093acb95809497cc816db2b74402c58b0eb53c9260b46765156bd4e63038c501dcca5f9891ceea1001eaa68073a0f73af6daf30000000000"], 0x3138) 19:24:04 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x0, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 486.619484][ T9357] XFS (loop1): Invalid superblock magic number 19:24:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) 19:24:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) 19:24:05 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x0, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001580)=@broute={'broute\x00', 0x20, 0x3, 0x498, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200010c0], 0x0, &(0x7f0000001080), &(0x7f00000010c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x24, 0xe8ff, '\x00', 'bond0\x00', '\x00', 'veth1_to_bridge\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @random="df88c99e7e21", [0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x5, 0x0, 0xeaa371e55faabd67, 'veth1_to_team\x00', 'veth0_to_bridge\x00', '\x00', 'dummy0\x00', @remote, [0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x70, 0xe8, 0x118}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0xb84, 0x3, 0x1, 0x0, "35db30e20bb28adfc0ba810bca5512b17b1fe7d5a3b2a04d5227613424b56af14a63ee64d2a079fcd96b018ea4b64d515b4d1b241ad58ebe0ad69ed4afa2f623"}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x100}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x19, 0x8f6, 'syzkaller1\x00', 'nlmon0\x00', 'team0\x00', '\x00', @broadcast, [0x0, 0xf68de3bc0635a843, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0xff], 0xa0, 0xf0, 0x220, [@cgroup0={'cgroup\x00', 0x8, {{0x800, 0x1}}}]}, [@common=@log={'log\x00', 0x28, {{0x100000001, "b38eb208903c3cf0305b8f4a212584ed45adf03842cd897b32cb9f0179af", 0xe}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:run_init_exec_t:s0\x00'}}}}]}]}, 0x510) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) write$FUSE_ATTR(r3, &(0x7f0000000040)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r4}}}, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x80000, 0x80000001) ioctl(r5, 0x6, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000540)={0x6}, 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000000000, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x4) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) time(&(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40485404, &(0x7f0000000200)={{0x200000001, 0x0, 0x0, 0x3}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r7, 0x2) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$NBD_SET_SIZE_BLOCKS(r8, 0xab07, 0x2) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dsp\x00', 0x100, 0x0) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000000900)) socket$inet6(0xa, 0x3, 0x2000000000003a) [ 487.116050][ T9471] XFS (loop3): Invalid superblock magic number 19:24:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x172, 0x0, 0x0, 0x0, 0x0) 19:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB], 0x3138) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8001, 0x4000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r2, 0x802, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x36}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gretap0\x00'}}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}]}, 0x6c}}, 0x4000) 19:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 487.559765][ T9656] XFS (loop1): Invalid superblock magic number 19:24:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e2f6669dd36b59c8eb992f56bfd623399fe6c65300a865a38e70686ae2f51cbffd544e5771fc299d19edc06e8"], 0x30) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'veth1_to_hsr\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="370000000200000000d9eaa771962fa6f184009a5b90830000800000001f0001000070e3000001000900"]}) 19:24:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x0, "8ae77ffdbbdf614acfdc2ffb4e8135267cc39645593cc24cc1a2090b7fa71b9d", 0x0, 0x8, 0x5, 0x5, 0x4, 0x4, 0x1cac, 0x3}) r1 = dup2(r0, r0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x20) r2 = socket$inet6(0xa, 0x3, 0x3c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs$namespace(r3, &(0x7f0000000200)='ns/cgroup\x00') connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x399) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="94557109c92e34f1ea978af9820eae4e1d577e5cf3a11a9cfb042e55b767b1e4ebd5a747c6fe8d981cf8885a83aeb34bf73aa5033063ed6437e23bdf69bca35bbfafa871bd6ec1c7729da6b3073f4e05af8e340fce24a90414b46351c7360a9b24a4bb3f4a48a1c2c7b5e84c5c5fb4d3cd2f53f396b8e48c36e5a697a26be6cbc2184c83ac1dc1e8b516da9b6b14e42434543bae5ea31a9c4ba69906333d80699705914075e82f11c82270ac11c08622c97d4424eae40f4e8fb486b386df90db61816898255aac1076c18dc98c519f0bbd63e344391df69a4226459ccde6dc1eecc9d55e929a11b3b0a1989cc6"], @ANYRES64=0x0, @ANYRESHEX=r0, @ANYRES32=r2, @ANYRESDEC=r0]], 0xfffffffffffffe00) 19:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:05 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x0, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 487.937292][ T9807] XFS (loop3): Invalid superblock magic number 19:24:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x180, 0x0, 0x0, 0x0, 0x0) 19:24:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, r1) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2800) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x289) 19:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) [ 488.439137][ T9979] XFS (loop1): Invalid superblock magic number 19:24:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000005, 0x40053, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000080)=0x80000) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) poll(&(0x7f0000000300)=[{r2, 0x4208}, {r3, 0x2010}, {r1, 0x220}, {r3, 0x108}, {r2, 0x8000}, {r1, 0x2000}, {r1, 0x8000}, {r0}, {r1, 0x4501}, {r0, 0x524}], 0xa, 0x1) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000100)={{0x2, 0x5, 0x6, 0x3, '\x00', 0x80000001}, 0x6, 0x27, 0x3, r4, 0x1, 0x8, 'syz1\x00', &(0x7f00000000c0)=['/proc/sys/net/ipv4/vs/snat_reroute\x00'], 0x23, [], [0xffffffffffffffe0, 0x7, 0xffff, 0x4]}) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3138) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) 19:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:24:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x80800) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) 19:24:06 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x0, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:24:06 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x3f, 0x8, 0x8, 0x3c}, 0x8) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180), 0x1, 0x2, 0x1}) [ 488.735013][T10109] XFS (loop3): Invalid superblock magic number 19:24:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x188, 0x0, 0x0, 0x0, 0x0) 19:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) semget(0x1, 0x0, 0x8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e2f1f000000000000004e6e35840628386f511b9f575d185f7c2df278beb88d0e4b222f1c0119ed5ce911b4"], 0x3138) r2 = dup2(r1, r0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000080)={0x7, {{0x2, 0x4e20, @broadcast}}, 0x1, 0x7, [{{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x7fff, @multicast2}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}}]}, 0x410) 19:24:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80f, 0x81) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x38b5d7217734a53f) shutdown(r1, 0x1) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@mcast2}, &(0x7f0000000080)=0x14) 19:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x50400, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="80000000000000001a3a4265300a"], 0x3138) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000080)={0x72, 0x17d, 0xfffffffffffffa1b, 'queue0\x00', 0x3}) 19:24:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="3d29b23f68f69414924cb128ef683188", 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 489.441387][T10302] XFS (loop1): Invalid superblock magic number 19:24:07 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) [ 489.574993][T10375] XFS (loop3): Invalid superblock magic number 19:24:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="33313672638ae12673202ec8d158e2f630cb7a7bf0e603eca96929eb8b61e0c0924d7360df22d284fb8698e18129291cb12d4f3788758a9e58b718b56256a70996a83a9a670b1c92b14ed4ac77d6e71d256a570be1b0d10b755e6465f95612df7cd4198554355b7d49ba593e4a817746331336404e13e978459d9ebbef82986d67029214bd8127cc3e6a1254dbcd1cd4d8482d323860fada36e2e4b49530a98b"], 0x3138) 19:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x21c, 0x0, 0x0, 0x0, 0x0) 19:24:08 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) recvfrom$llc(r0, &(0x7f00000001c0)=""/218, 0xda, 0x0, &(0x7f00000002c0)={0x1a, 0xd, 0x206, 0x40fe, 0x0, 0x1ff, @remote}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) listen(r1, 0x7fffffff) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:klogd_var_run_t:s0\x00', 0x25, 0x2) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) 19:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) setregid(r1, r2) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e2f66ff0765300a"], 0x3138) 19:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'3! ', './file0'}, 0xb) 19:24:08 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 490.425945][T10569] XFS (loop1): Invalid superblock magic number [ 490.498273][T10645] XFS (loop3): Invalid superblock magic number 19:24:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x30000, 0x0) sendto$rxrpc(r1, &(0x7f0000000080)="ebe96a85e11eee520d531a8b9c441db7108357f2e601f78a7127a6ed8033fee359cf7b39ff3133fbb16990d741d4c732551f6d10dfcdaabe943d12ac529e15b0add0c092dc3fa1382b36873186681d5d7a6a5140ffe36a5e771dff0291613578b1e201f95c71d7265945937944", 0x6d, 0x8000, &(0x7f0000000100)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, 0x24) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40f7, 0x1ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'security'}, {0x20, '#'}, {0x20, 'nodev[\''}, {0x20, 'selinuxeth0/vboxnet0&'}, {0x20, '[systemeth0GPL'}, {0x20, '*keyring'}, {0x20, '\xee-+vmnet1posix_acl_accesscpuset'}], 0xa, "8467b04121fac2aab0ae4a5709a65a98e497d5f3ca706a8ca14954898fb2e3466a5ff86f721d87049810be50d2bbbdd6f55f8aef574d0b684cac915cadf26c609cc9f8317ef0c0f8583e52b17fbca7b7b7f3f3e84e50745f8a1d57faa37a7cd19a84b280c4b9185d19bbacd6245829df5df65be88636354b"}, 0xe4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3# ./file0\n'], 0x3138) [ 490.896089][T10883] XFS (loop1): Invalid superblock magic number 19:24:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x284, 0x0, 0x0, 0x0, 0x0) 19:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x7fffffffffffff, 0x3b) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000004f00)='/proc/self/net/pfkey\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000004f80)='nbd\x00') r4 = syz_open_dev$amidi(&(0x7f0000005080)='/dev/amidi#\x00', 0xfffffffffffffffa, 0x200) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000050c0)='/dev/btrfs-control\x00', 0x0, 0x0) r6 = syz_open_dev$adsp(&(0x7f0000005100)='/dev/adsp#\x00', 0x5, 0x80100) pipe(&(0x7f0000005140)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000005240)={&(0x7f0000004f40)={0x10, 0x0, 0x0, 0x9}, 0xc, &(0x7f0000005200)={&(0x7f0000005180)={0x60, r3, 0xa01, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3ff}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r0}, {0x8, 0x1, r7}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x8004) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="3cc6bdd245d83c1fa2a0f5abc6e720d4b249d1f4121e212039ebd6d1a22a0037fa45c168ce8141c6336ba5e5b295940f4ebc63028673b8464fdb3084a4afe53f032c59bcb9f36614b5422ac49df06b6c656080675f016a048e89418007b7449804644c54310b6978edad98f8d4bc801480bf6bdcd1c8a956847aff5359e2b39c9d9505961eded151a7580d"], 0x3138) 19:24:09 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x9, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) readahead(r1, 0x80000001, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000b80300002802000028020000f80000000000000000000000200300002003000020030000200300002003000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x418) 19:24:09 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:24:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'3! ', './file0', [{0x20, 'eth0&wlan0]\xa8\\eth1'}, {0x20, '\''}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}]}, 0x2f) 19:24:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x95, 0x800) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000580)={0xc92, 0x0, 0x89f0, 'queue0\x00', 0x4}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000080)={{0x0, 0x7, 0x7fffffff, 0x1, 'syz0\x00', 0x3}, 0x1, [0x48, 0xffffffffffffffff, 0x5, 0x8, 0x0, 0x8000, 0x21, 0x231, 0x9, 0x10001, 0x0, 0x4, 0x40, 0x3f, 0x6, 0x6, 0x9, 0x101, 0x7, 0x9, 0x3, 0x1, 0x1ff, 0x6, 0xb4f, 0x1000000000000000, 0x401, 0x3, 0xffffffffffffffe0, 0x5873, 0x0, 0x0, 0x1000, 0x6e, 0xfff, 0xffff, 0x1152, 0x7, 0x6, 0x0, 0x4, 0x2000000000000, 0xffffffffffffffc1, 0x7ff, 0x9, 0x6, 0x7, 0x3ff, 0x2, 0x3ff, 0x0, 0x3, 0x67, 0xba, 0x1, 0x6, 0x0, 0xdb, 0x4, 0x10000, 0x5, 0x86, 0x0, 0x8, 0x4, 0xffffffffffff0001, 0x22f, 0x100000001, 0x82, 0x2, 0x7ff, 0x9, 0x7, 0x3, 0xffff, 0x1f4f, 0x665, 0xfffffffffffffffc, 0x10001, 0x4d, 0x8001, 0x0, 0x6, 0x100000001, 0x6, 0x3, 0x6, 0x7, 0x401, 0x81, 0x5, 0x101, 0x1, 0x0, 0x9, 0x1, 0x80000000, 0x65, 0xf2e, 0x80000001, 0x5, 0xffffffffffffff6f, 0xfffffffffffffc00, 0x7e8, 0x40, 0x80000000, 0x5, 0x0, 0x338, 0x80, 0x8000, 0x4, 0x4, 0x5, 0x8, 0x7, 0x6, 0x7, 0x9, 0x7f, 0x61, 0x7e21, 0x199, 0x2, 0x5, 0x4, 0x9, 0x13f], {0x77359400}}) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000640)={@empty, @multicast1, 0x0}, &(0x7f0000000680)=0xc) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000006c0)={@mcast1, @ipv4={[], [], @broadcast}, @dev={0xfe, 0x80, [], 0x17}, 0x6, 0xffff, 0x1, 0x100, 0xea77, 0x80000, r3}) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xb) 19:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 491.580683][T10910] XFS (loop3): Invalid superblock magic number 19:24:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 491.657031][T10963] XFS (loop1): Invalid superblock magic number 19:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) [ 492.120630][T11173] XFS (loop1): Invalid superblock magic number 19:24:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/2) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/98, &(0x7f0000000100)=0x62) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3314201c2766696c65300a"], 0x3138) 19:24:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x286, 0x0, 0x0, 0x0, 0x0) 19:24:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8100, 0x0) getpeername$tipc(r0, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="33212011ea8cee6c2e2f66"], 0x3138) 19:24:10 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:10 executing program 2: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x101100, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x20, 0x13c, 0x1, 0x7, 0x0, 0x100, 0x40410, 0x0, 0x7, 0x5, 0x20, 0x55c, 0x8001, 0x3, 0x9, 0x0, 0x32c, 0x7f, 0x100000001, 0x0, 0xff80, 0x73, 0x6, 0x1, 0x4, 0x0, 0xc528, 0x100, 0x10001, 0x5, 0x4e11, 0x1, 0x5, 0x101, 0x80000001, 0x1ff, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x1ff, 0x7, 0x0, 0x53, 0x1, 0x4b42}, 0x0, 0x5, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 492.737024][T11192] XFS (loop3): Invalid superblock magic number [ 492.791927][T11270] XFS (loop1): Invalid superblock magic number 19:24:11 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000080)={0x1, 0xffffffffffffffe5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x1f}, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x101c00, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f0000000140)=""/142, 0x8e) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="de53202e2f66696c65300a"], 0x3138) 19:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x6, 0x0, 0x0, 0xfff, 0x0, 0x40000, 0xfffffffffffffffd, 0x0, 0x5, 0x40, 0x4000000000, 0x0, 0x3, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x77, 0x122bb593, 0x0, 0x9, 0x0, 0x1, 0x0, 0x9, 0x40, 0x2, 0x1, 0x611, 0x31c47e9d, 0x0, 0x6, 0x80000001, 0x7ff, 0x5, 0xb6, 0x1, 0x20, 0x2, 0x3, 0x7, 0x8001, 0xfff, 0x6, 0x3, 0x7, 0x2, 0x0, 0xc, 0x3ff, 0x3f, 0x8000, 0x185, 0x0, 0xe5c, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x10000, 0x4, 0x2, 0x5, 0x40}, 0x0, 0x4, r0, 0x3) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000)={0x81, 0x3, 0x7f}, 0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0xa2, "b06124b2b169e9553e840906fa7e362e6980605a38525a435dd86c4620f06a482dd55a10500dced7331b3064fa80daf8fa65cc760eddb50486fe4b4ebd9af847cdc1560a8af9dacaa0a705917bf87f91091269f6ef30dc8d45a1130486b151584c04b596ada9fd207d557bee4a10f6a8dce70b311b74cbcb0c0cd25c56cc5b190b766bd3c186757759608180c3f37419a9dcc847d017fab2011b6397a2f6a6522f8d"}, &(0x7f0000000280)=0xaa) 19:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 19:24:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) 19:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:11 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @local, @multicast1}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@mcast2, r1}, 0x14) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x10001}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:11 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:11 executing program 2: perf_event_open(&(0x7f000001d000)={0xfffffffffffffffe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e2f666934a0ac90395e64086c9615130eca4085109b9950"], 0x3138) 19:24:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3# ./file0\n'], 0x3138) [ 493.717489][T11468] XFS (loop3): Invalid superblock magic number 19:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 493.757999][T11499] XFS (loop1): Invalid superblock magic number 19:24:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.nlink\x00', &(0x7f0000000180)=""/107, 0x6b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x2000000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x5, 0xfffffffffffffffe, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:usb_device_t:s0\x00', 0x22, 0x3) 19:24:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x35c, 0x0, 0x0, 0x0, 0x0) 19:24:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet6_buf(r0, 0x29, 0x3c, &(0x7f0000000080)=""/84, &(0x7f0000000000)=0x54) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000efffd0077e0100ed00e3bff6280c2f387c3a25771f589bc91aa95b0100000000000000abf322b492c0368900c4a4133517c7849f8bfe9de2e14fa6be4176b77d27dc079709e0819e23e57ed44aed3532403d5a3103b889a75fb0b17a6da99bff334b43d0f117157ca4668bdfdd250f1a00397fa5885835a1c4a3ec595e6b42b3013351c1aa988c1a5ffe87"], 0x3138) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x4, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x70639205}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x84800, 0x0) r3 = geteuid() ioprio_get$uid(0x3, r3) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000300)) 19:24:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:12 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xab1, 0x800) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0x8420, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) 19:24:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="abb53022d885285f593f024687b58bae907f4203665136490634eff3178eed53bbee511efcedf24caaae1a6ce0b7bf86228bfd8c9d20decc9fd5917780f6"], 0x3138) 19:24:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 494.762754][T11810] XFS (loop1): Invalid superblock magic number 19:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) [ 494.814323][T11857] XFS (loop3): Invalid superblock magic number 19:24:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20200, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[0x4, 0xfca, 0x4, 0x7fffffff]}) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000100)={0x1000003f, 0xff, 0x20}) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='/file0\n'], 0x3138) 19:24:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x3f0, 0x0, 0x0, 0x0, 0x0) 19:24:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x2, 0x7}, {0x9}, {0xa15, 0x5f}, {0x100000001, 0x5}, {0x20, 0x6}, {0x80000000, 0x5}, {0x7, 0x93c}, {0x200, 0x4}]}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:13 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:13 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1000, 0x200) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x800, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="3321202e2f66077462d175fd51696c65300ab007530880004ca78152e4be9d672c00a11bf4d002f32fdb4d3fce84de2dc6569505000000611cd5ba960620"], 0x3138) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mISDNtimer\x00', 0x204100, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}, @in6={0xa, 0x4e24, 0x7, @loopback}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e23, 0x100, @local, 0xfff8000000000000}, @in6={0xa, 0x4e20, 0x6, @mcast2}, @in={0x2, 0x4e22, @rand_addr=0xff}, @in={0x2, 0x4e20, @empty}], 0xa4) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x202000) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000100)={0x1, @random="72222dfb8b39"}) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000000)=0x2) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0xffffffff) 19:24:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r2 = dup3(r1, r0, 0x80000) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000140)={@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x3, 0x4, 0x1, {0xa, 0x4e23, 0x4, @empty, 0x6}}}, {&(0x7f0000000080)=""/141, 0x8d}, &(0x7f0000000000), 0x8}, 0xa0) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="96dc0c781419be3b65300a"], 0x3138) 19:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:24:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e2f66e96c65300a"], 0x3138) [ 495.684567][T12113] XFS (loop1): Invalid superblock magic number 19:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:24:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xfffffffffffffe47) [ 495.868007][T12192] XFS (loop3): Invalid superblock magic number [ 496.320551][T12374] XFS (loop3): Invalid superblock magic number 19:24:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 19:24:14 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1a, 0x101000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x8000, 0xac4, 0x100000001}, &(0x7f00000000c0)=0x14) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in={{0x2, 0x4e24, @local}}}, 0x84) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000498c0000000000"], 0x3138) [ 496.596506][T12398] XFS (loop1): Invalid superblock magic number 19:24:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) clock_gettime(0x0, &(0x7f0000002780)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002740)=[{{&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002600)=[{&(0x7f0000000100)=""/92, 0x5c}, {&(0x7f0000000180)=""/178, 0xb2}, {&(0x7f0000000240)=""/183, 0xb7}, {&(0x7f0000000300)=""/106, 0x6a}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/202, 0xca}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/232, 0xe8}, {&(0x7f0000000000)=""/48, 0x30}], 0xa, &(0x7f00000026c0)=""/73, 0x49}, 0x1a}], 0x1, 0x40, &(0x7f00000027c0)={r1, r2+10000000}) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000002800)={{0x4, 0x2cbe}, 0x2}, 0x10) 19:24:14 executing program 0: modify_ldt$read_default(0x2, &(0x7f0000000400)=""/142, 0x4bc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000003c0)={@dev={0xfe, 0x80, [], 0x11}, r1}, 0x14) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r3, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="b7ee9ad8c8dd2d2236fc8817988d7ce9"}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0xc040) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3339d65195587ab900002e2f66690aabfc41970e5ae1d782d1bf1aece5d3322cc327adb5b54e0deaa131fb8dc400cd1eb51bf3c8b61b0984a5c9de8513bf60e61955d2df0000000000000000"], 0x3138) 19:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:14 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) [ 496.876785][T12419] XFS (loop3): Invalid superblock magic number 19:24:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000080)=@sco={0x1f, {0x4, 0x7, 0x1, 0x1, 0x2, 0x5ff0}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000000)="684ff0ecfb816fe9b01e744e91bb79eef1a8bf", 0x13}, {&(0x7f0000000100)="4afdfd99806f2e709090fb149f166f5fabdf0f0087d8744c61c5e089cbc47d0adcfa2b834c95e88a24478d591210998ca8534a61704866e41dac438880e6cea362944bc4557b45b74a8feae00f5763cba9aa514e815efd9b8d78276d952cbd26aba41e0eb98134498629514431b425f6d1fe218f0318421f927da59a57df645bdee42cf5fde6143095b4ff222cc83f56a155a216b1d0608333091a70ad2e77c04149e4619c9b40984d1fcdd0c4aac123912543e5a70855710650418a7b0b7ace0739a50b1bc20e51fc476f416085600246319d6907cb240d1c5587586a2f76b01997f21694a885b2ccf28c8369c019119f6d2de939", 0xf5}, {&(0x7f0000000200)="e662a873d23a63e4d8e86bf735f74502f6b45dcb56d34dc26698a4b0619999095cd59c6a3239bb376179f3c4e68c9bd1bf51e7427dfb5cabfc8eebc1150e7cdf4213e26621ef3ebcc2a4db61f9fec54f6a82e4a5fbc7a75713a58d6f75914104fcbd27f93af12ee59d68c43d335591295eb426dd22e33aa7c8dda0abd2ba4f52fea11c19fa4cbdaa9b9bdca6a3c3792939e75593a6f02e48adaa7479e233388c0374b6244a9252344cc501cc00746e2d6d7cb3b3b552ce06008cb1af7d0c706c3329dadc049ec56616db22b97085433476057e818262317c9bce1bd149118bcf79737c", 0xe3}, {&(0x7f0000000300)="f56474617ea050430e567863b8af743448940a69665260c3e2d317be18f2a82390060bf7fb2a2140e99da263ce23e9b5d68c2d4615f1fbdaf64b1a07a846cb65812682c6ace92f6ec7e557deed3689873572e0142f74941e9ffdb56035f8e43be3fc8761ea0ae68733bff3aa62d2521d70aea573c24fb08ab93f3e5b2ba40e54bcf255103f0edfa402d195f7d1c710aa50dac4ac684b15a8a1f2ef3f3df1a29fed17a2f460ed40bb4573998bfb2f2a94d866fde5fc4def0aa796d67c70d57a759490ddf96ec9f528eb821cee55c57cad5efbde9d14822afd10fba595ea48e072797aaa1e9a6a30b156f695856e", 0xed}, {&(0x7f0000000400)="949665376b26d2b3a5d5b11ca0d561e7be1061c8c318b75d4220837896a86b754497b917773070b0c741", 0x2a}], 0x5, &(0x7f00000004c0)=[{0x70, 0x103, 0x0, "30f2e48fdd9c6a46222b4edca23376b2efede3ee4a2e6484dec6d25230b4092bf3928a4908cc2b67c857202fb4b4547ce43bde365866ff374f0ad32bc41c19d16cef41e39eb8fe4d8269b44a24ea416a1a219c1d350db601499611"}, {0xb8, 0x13f, 0x8000, "31620400cbe1b254b8714ed8b1796044d782bbedfe4beaa58db575fbbd9b87877cf11c1f68509b0bd947f64bb4591119ba216b9d21cda7366a68e45b362de73f43e790b7aa93fc63a3db47d7bb276fb0cb720c2c1a1a41574bca6d257f035498b29e68584ed4303142de0ee94bdcdebd07b047c5902f6bbbd542a64bf0e94594399ce13bbeaa915dbbe378a4dfdd35be124689b7acf2f6168f9d480f5e0c8e59cdc1947b61d1"}, {0x40, 0x0, 0x0, "f56b6470ac60e11face1a39b423fd8a5670f2e7ff6c190dc29d6c07ff7c3abf548f38eab8daf9441b9"}], 0x168}, 0x40080) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x6a4, 0x6, 0x201, 0x4, 0x100000001, 0x3, 0x3b, 0xffffffff, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="080080002000000000000000003400009f2a6349e61d783e9d03000000000000006e4554fae236da889572d3dedceeab8e154fab4a02a2944672f59a0a5b29bac05d512c036c88f3cb0acf4acc60c10faf9ce8a94854fa"], &(0x7f0000000100)=0x14) 19:24:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 19:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="432f90ab0366d33d41a7b89ce1f2e6f98299e936e3f00f6f5e043d9468eb8b363ec2c6832c056d78ae2fc179d066f7d0fad24b90989cfc2f7d8f32ea4f44399017f60fce29f78105f4976d445f30c05a1322b7757848885d07c2de110af73a078558a9cceff0ef79ae17aeedbd14ac1a31bd36b7380b296af39de093e1c9fd31b5d2162d8fce1890e2b25b2ddc2abc5a210c64299f37cf36720533eaff198e99ba882f713e0e76b4da83caa85b26fc31279c14b1facdf96555a214c7d952be10f836946874db00ce4d5d459540c6586b7142e76ffa5bf8845f5b1dfeb799f43b5849f4a1", 0xe4}], 0x1, 0x0, 0x0, 0x40004}, 0x80) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:policy_config_t:s0\x00', 0x25, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:15 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, 0x0) 19:24:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e2f6669ab4e5a70"], 0x3138) 19:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='#!?./file0\n'], 0x3138) [ 497.554310][T12671] XFS (loop1): Invalid superblock magic number 19:24:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="3321202e2f66696c65300a8b5499e374ecceebc3864896f247481f3fe59e71a51789654453638796b483de67499e2b501f5cfb3bd9ad087ac670ed0eb5e73395c5d68cd77d9e1b781620c135bcaef441150bc31cb9d9101a1ac8a269daf2ef31a9ab13f705d74aec"], 0x68) 19:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null]}) ioctl$CAPI_INSTALLED(r0, 0x80024322) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x16f) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 497.883915][T12694] XFS (loop3): Invalid superblock magic number 19:24:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB], 0x3138) 19:24:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 19:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x181000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:16 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, 0x0) [ 498.489950][T12940] XFS (loop1): Invalid superblock magic number 19:24:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x1}, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0xb}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:16 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xc0000, 0x0) write$P9_RLINK(r0, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000000000)={'3! ', './file0', [{0x20, '3! '}, {0x20, '3! '}, {0x20, '\'bdevGPL'}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}]}, 0x28) 19:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:16 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6000, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="000000b100000000000000"], 0x3138) r2 = geteuid() syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000140)="2963465424646916ea914944dc8ed555a5e1770a103fccad59d360abb8cdef15965876bffcc35412b4be487b3eea1bfba88f78b6d2780d5161a273d4a93620ea498a409a9a81367c2d645565575709418fee09900838401f9a6077943b56b761e57cbee8fdde94d36e8c1327fc2643e5905fea90be6c79f6a24140268d02fb9bc5eac7db855087e0", 0x88, 0xfffffffffffffffd}, {&(0x7f0000000200)="a4fed7eb854d771b3553c18f76dee60177a356a3c1969bfa76d8c7f81e8db6abc8a160fb08b9e6deb7fcb6f135c32ed0aab175ecf5cb8b7529e03e9b4424cf79e43019886434cadac27903486c4d35c35098df04e87029c2a5f991e82b7fc096afb0e3b91e6f2f2b1964c94b7473a48640c725ee09408348fde5cf7152e71b666791ace57f7484c512256b", 0x8b, 0x1000}, {&(0x7f00000002c0)="3da505a3393051fec731e30fd7cc1424b33ed95fd6d078228b5905e39d12696ba50322b86559a74a1f956354b30f7cbab46c3137af7b321611b57be4c4029104fd85d1ba6b2361cf0b0864b2cfe19a703218584b979022315306df59b02f83", 0x5f}, {&(0x7f0000000340)="b4bf0e6c221ae8c2a4b5303880b981a0b253786c4951b382abe14f7b2b7d72bd29eda79ff42c4c596d4a387c768e5314a57cfdf6a761bbd5952319d75ff6f8407406f3028fb343e423fe9a831beda8f145a71af5c800037170d1bfb811b2290f08723412cb54ba973c78e849f1c63153247d98a517a2f19f308046908fa8a89869080531f173cd4cf03695af725c1a68829d39b9e934bd240574746bcc8f075190d5505938eef4726a05e3522cb07347a2b8d3c69b089ff6070f", 0xba, 0x6}, {&(0x7f0000000400)="f87fc97a8e24edab05d7659bc2347224f8b1021e8cb7f963a01f1d831bc8f8bf0fa4e70b20c53c0ca244ca322a8ecbcf1a9cfa1efb0a45a19634862a0c09e00b611c6f0188e928e556eeed4d83a3aa8e5df62f576ba4285c3f3667b5ae1ed7050aab81aed940bc12b419909bc5deea5164445f00d9a90b426a29cd50e41b663ca1a340dc38c1a566548f92ce013739660209ee9d559d0bbfa84e2164295ed2f13f790e816cfeda5cf61f37d44706ea", 0xaf, 0x6}], 0x801440, &(0x7f0000000540)={[{@fat=@uid={'uid', 0x3d, r2}}, {@dots='dots'}], [{@hash='hash'}, {@dont_appraise='dont_appraise'}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) 19:24:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 498.817668][T13000] XFS (loop3): Invalid superblock magic number 19:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x900, 0x0, 0x0, 0x0, 0x0) 19:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:24:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xd9, "018efc0ab895ac60f122fd773ebdde3a07648a3d0696bcb623530fa69d56107b4dfe3c179110b27dc87920bf13f195e5e2afa8f5b6c9d7e242d05ad93d74098a73396a1400aa10e26a8d433160a5920e483aed592eac12cefedfab20c69609416d88171b4b1de586782cb4c670e51d45d2bc9437471f354dcd28b9ff7b928f354e7cc8e81bed7d50d1502f9136a5c8f13fb624489905167a0f1cc9fea33ef015dca5e10190d1236d8ed2c5141689f1fc346684cac67468ab7b3e0cec7eb658cd024eefb2bd835f8d796700b65c504bde049001520cd9c806a2"}, &(0x7f0000000000)=0xe1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x4a3e}, 0x8) [ 499.591941][T13208] XFS (loop1): Invalid superblock magic number 19:24:17 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, 0x0) 19:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20100, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000080)='3! ') r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x1000, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000680)={0x7, 0x7f, 0x20c, 0xfffffffffffffffa, 0x6, 0x72c4, 0x7, 0x7, 0x0}, &(0x7f00000006c0)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000700)={r3, 0x6305, 0xa5, "b3078c1591fcecc893dc15f68bbd4ba7dbdc5dc5ec75bc4384bfe145a48fcf8a536b8b18a78970338573895788f298d63190d23238bcd8843efd5fe98b71b41f44c9f8ba00d24c0e630e3f91e9acba47cd82a35b17e759633a4ea63864637b48ecf239d2158dab1bffb77fe364761c783dd46edbcc659de2d4623c9d5bc5adac4930f974dccb1a4727face0b0f11a734d73505265a80f1c12016c1cc409f33e3d63b6299b6"}, 0xad) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000180)={"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"}) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000580)=@assoc_id=0x0, &(0x7f00000005c0)=0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r5, 0x30a9}, &(0x7f00000000c0)=0xffffffd3) write$binfmt_script(r2, &(0x7f0000001840)=ANY=[@ANYRESHEX, @ANYRES32=r2, @ANYRESDEC=r1, @ANYRESHEX=r4, @ANYRES16=r5, @ANYRESHEX=r5, @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYRESHEX=0x0, @ANYRESHEX=r0, @ANYBLOB="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", @ANYRES32=r0], @ANYPTR64=&(0x7f0000001800)=ANY=[@ANYRES16=r3], @ANYRESDEC=r4], 0x74) 19:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0xfffffffffffffffe, 0xfff, @mcast2, 0x7}}, 0x7, 0x10000}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x7, 0xfffffffffffffffa, 0xffffffffffffffff, 0x550, 0xdb}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) syslog(0x4, &(0x7f00000001c0)=""/221, 0xdd) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 499.969686][T13340] XFS (loop3): Invalid superblock magic number 19:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xa00, 0x0, 0x0, 0x0, 0x0) 19:24:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0xfffffffffffffff8, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'3! ', './file0', [], 0xa, "22414b9daf425c67862b73e24ed6392148a9d02248b77cb2163e92a2cd86ccabfb0a7c962143d8ecf8086ea50ac77f173d55000000000000000b7f65ecc7130b36d816e8b0084809596c299c36fdc1b510b0b61d607a7212eb1804a3e83ca1bba06e2b01f0d035d93146058465157d1325341f4c815124830958cd0f6704bb3cb19b65ea71"}, 0x90) [ 500.595370][T13579] XFS (loop1): Invalid superblock magic number 19:24:18 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x0, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="5d00248e5c3d3033090000"], 0x3138) 19:24:18 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x64, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x228, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x40000000, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 501.006981][T13611] XFS (loop3): Invalid superblock magic number 19:24:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x80000003, 0x1ffffd) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x6) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xd750, 0x4040) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x40, 0x100, 0x6, 0x800, 0x0, 0x80000008, 0xc800, 0x2, 0x1, 0xff, 0x401, 0x3, 0x7, 0xc05, 0x0, 0x3f, 0x7, 0x7, 0x4, 0x7, 0x1, 0x1, 0xe2c0000000000000, 0x7fffffff, 0x0, 0x81, 0x6, 0x6, 0x47, 0x0, 0x4, 0x1596e63c, 0x7, 0x3f, 0x7, 0x8000, 0x0, 0xcb0e, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x2, 0x1, 0xe36, 0x9, 0x81, 0x0, 0x100000000}, r2, 0xa, 0xffffffffffffffff, 0xb) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="00eb000000000000000026"], 0x3138) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)=0x0) ioprio_get$pid(0x1, r3) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000200)={0x3ff, 0x1f, 0x9, 0x9, "7b3a7392c99aee149a42402b3e0c4d51e838a6de65d169d439eba76e922c8c49"}) 19:24:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x7e, "950302ffb6cabec14a0e69a851d1027c9c191783a8b04e724e706c24f90add37c7377ff36597a187d1b0241bfa768299c50d830302e8d4cded0a51d7ec557de9391978675eda94bd89068a0666dd5215f08683a3e854f8c6c961a62775787356b1d14eb2ca639138cedf7381af9884d712395d9f15479d8837737f258f9f"}, &(0x7f0000000000)=0x86) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x20}, 0x8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) chdir(&(0x7f0000000180)='./file0\x00') write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x600, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000080)={0x1, 0x1}) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xb00, 0x0, 0x0, 0x0, 0x0) 19:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 501.645627][T13809] XFS (loop1): Invalid superblock magic number 19:24:19 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x0, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KDSKBLED(r1, 0x4b65, 0x8) 19:24:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 19:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x5) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x233b7582}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='Xnse'], 0x3138) 19:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x22002, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080), 0x8) [ 502.025330][T13948] XFS (loop3): Invalid superblock magic number 19:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xc00, 0x0, 0x0, 0x0, 0x0) 19:24:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x100, 0x427b, 0x7fff, 0xe2bd, 0x0, 0x8, 0x0, 0x1, 0x5, 0xd0, 0x4, 0x7, 0x0, 0x80000001, 0x9, 0x5, 0x1, 0x5, 0x0, 0xff, 0x1, 0x0, 0xd3b9, 0x1f, 0x200, 0x1, 0x4d, 0x9, 0x8c, 0x8000000, 0x401, 0x4, 0x9, 0x1, 0x10001, 0x200, 0x0, 0x6, 0x6, @perf_bp={&(0x7f0000000000), 0x9}, 0x4000, 0x5, 0x100, 0x5, 0x16f, 0x2, 0x2}, r1, 0xf, 0xffffffffffffff9c, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3!e0\n'], 0x3138) 19:24:20 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x0, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) fchown(r0, r1, r2) r3 = socket$inet6(0xa, 0x1000000000000003, 0x3c) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) fcntl$setown(r0, 0x8, r4) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_mr_vif\x00') r6 = msgget$private(0x0, 0x400) r7 = getuid() r8 = getgid() ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f00000004c0)) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) r10 = getgid() r11 = gettid() r12 = fcntl$getown(r5, 0x9) msgctl$IPC_SET(r6, 0x1, &(0x7f0000000240)={{0x1, r7, r8, r9, r10, 0x80, 0x7}, 0x0, 0x2, 0x9, 0xcc31, 0x100, 0xf486, r11, r12}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r5, 0x800442d4, &(0x7f0000000100)=0x4) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000080)=0x3, 0x4) 19:24:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x0, 0x0, 0x8000}, r0, 0x0, 0xffffffffffffffff, 0xa) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 502.580761][T14127] XFS (loop1): Invalid superblock magic number 19:24:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:20 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x2c2) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x98acbd8a2d4c089, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getgid() listen(r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x200400, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000900)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, {0x6, @local}, 0x0, {0x2, 0x4e23, @multicast2}, 'veth1_to_team\x00'}) connect$unix(0xffffffffffffffff, 0x0, 0x0) r3 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$P9_RREADDIR(r4, 0x0, 0x0) execve(0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffc, 0x7, 0x1, 0x6, 0x8000, 0x3, 0x3e, 0x6, 0x275, 0x40, 0xfe, 0x8, 0x8001, 0x38, 0x2, 0x0, 0x0, 0x200}, [{0x70000000, 0x0, 0x0, 0x80000001, 0x0, 0xffffffffffffffc0, 0x4, 0x200}], "", [[], [], [], []]}, 0x478) 19:24:20 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080), 0x1) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:21 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x44, 0x0, &(0x7f0000000280)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 503.137597][T14266] XFS (loop3): Invalid superblock magic number [ 503.163912][T14394] binder_alloc: 14392: binder_alloc_buf, no vma [ 503.180639][T14394] binder: 14392:14394 transaction failed 29189/-3, size 0-0 line 3147 [ 503.200947][T14395] binder: BINDER_SET_CONTEXT_MGR already set [ 503.207680][T14395] binder: 14392:14395 ioctl 40046207 0 returned -16 [ 503.240418][T14394] binder_alloc: 14392: binder_alloc_buf, no vma [ 503.241332][ T2988] binder: undelivered TRANSACTION_ERROR: 29189 [ 503.248459][T14394] binder: 14392:14394 transaction failed 29189/-3, size 0-0 line 3147 [ 503.269828][ T7686] binder: undelivered TRANSACTION_ERROR: 29189 19:24:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xd00, 0x0, 0x0, 0x0, 0x0) 19:24:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4c01, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0xe2, "6ce725db18a02791f697728f4b623de1d8e6ca233d7a857a69ef81bf76086f857f239170bf2ecacc4e88553374d5626349515864843cc51fe509e34634a7bc80f2ae1b73f12a8e634c62686d4c8440972b832ef753d19bc406acecf183ea2c355d1faddaf6b6368f84aafaca1f8041c7149dc4a1eb28bff5f0914c88ad605276565e51e50927040e017a21e7c0408d7f05c00730dca683fffd18439ead9b8b635b68a065cb9903de745eaa9bbf12203e28f7ab25379e8775bdc11e7bc5aa18aaa4933d84f883c084ae3d326aa3a524364270cb0e47de2765d32120627e60e156b5d3"}, &(0x7f00000001c0)=0x106) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:21 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x0, 0x4, 'queue0\x00', 0x8}) 19:24:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x400) 19:24:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 503.641297][T14501] XFS (loop1): Invalid superblock magic number 19:24:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:24:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x4020000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000600)='wlan1\x00\x04usted/\xf8\xf7[+user\x00') 19:24:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3! \a\x00\x00\x00\x00\x00\x00\x00'], 0x3138) 19:24:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:24:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:24:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) 19:24:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) sendmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x6, 0x12, 0x20, {}, {0x77359400}, {0x1, 0xe1c, 0x5, 0x9}, 0x1, @can={{0x3, 0x4, 0x3, 0x7fff}, 0x0, 0x2, 0x0, 0x0, "51ac89f4b35df78a"}}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4004801) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 504.230348][T14721] XFS (loop3): Invalid superblock magic number 19:24:22 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x0, 0x4, 'queue0\x00', 0x8}) 19:24:22 executing program 0: syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) 19:24:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 504.509791][T14838] XFS (loop1): Invalid superblock magic number 19:24:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x35e6c68dfd6c3241, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="c5bca702ad1e4e4baa750ecd065189c125bbc45431f5169c41a92d44bdfe55362ba6b263f12cf82ffac20d2c0f672e957223ce46145ba184bd48") getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 19:24:23 executing program 0: pipe(&(0x7f00000004c0)) syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x1, 0x2) write(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video2\x00', 0x2, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 19:24:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:23 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x0, 0x4, 'queue0\x00', 0x8}) 19:24:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) 19:24:23 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x0, 0x4, 'queue0\x00', 0x8}) 19:24:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 505.266513][T14938] XFS (loop3): Invalid superblock magic number 19:24:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000080)=0x4) 19:24:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 505.531261][T15050] XFS (loop1): Invalid superblock magic number 19:24:23 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x0, 'queue0\x00', 0x8}) 19:24:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x13, 0x121000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x7, 0x2, 0x6, 0x9, 'syz1\x00', 0x1}, 0x1, 0x3, 0x4, r2, 0x2, 0xd29, 'syz0\x00', &(0x7f00000000c0)=['#)[/lo%\x00', '3! '], 0xb, [], [0xfff, 0x6, 0x3, 0x2000000000000]}) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:24 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x0, 0x4, 'queue0\x00', 0x8}) [ 506.189676][T15185] XFS (loop3): Invalid superblock magic number 19:24:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1200, 0x0, 0x0, 0x0, 0x0) 19:24:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)={'3! ', './file0', [{0x20, '\''}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}]}, 0x19) 19:24:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x80000000}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 19:24:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) [ 506.607546][T15315] XFS (loop1): Invalid superblock magic number 19:24:24 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x0, 'queue0\x00', 0x8}) 19:24:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x100, 0x427b, 0x7fff, 0xe2bd, 0x0, 0x8, 0x0, 0x1, 0x5, 0xd0, 0x4, 0x7, 0x0, 0x80000001, 0x9, 0x5, 0x1, 0x5, 0x0, 0xff, 0x1, 0x0, 0xd3b9, 0x1f, 0x200, 0x1, 0x4d, 0x9, 0x8c, 0x8000000, 0x401, 0x4, 0x9, 0x1, 0x10001, 0x200, 0x0, 0x6, 0x6, @perf_bp={&(0x7f0000000000), 0x9}, 0x4000, 0x5, 0x100, 0x5, 0x16f, 0x2, 0x2}, r1, 0xf, 0xffffffffffffff9c, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3!e0\n'], 0x3138) 19:24:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1a00, 0x0, 0x0, 0x0, 0x0) [ 507.294171][T15558] XFS (loop3): Invalid superblock magic number 19:24:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fff, 0x1) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x3) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000000c0)) inotify_init1(0x80800) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xfffffffffffffff8}, 0x5) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x5) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x233b7582}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='Xnse'], 0x3138) 19:24:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) [ 507.475318][T15625] XFS (loop1): Invalid superblock magic number 19:24:25 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6000, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="000000b100000000000000"], 0x3138) r2 = geteuid() syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000140)="2963465424646916ea914944dc8ed555a5e1770a103fccad59d360abb8cdef15965876bffcc35412b4be487b3eea1bfba88f78b6d2780d5161a273d4a93620ea498a409a9a81367c2d645565575709418fee09900838401f9a6077943b56b761e57cbee8fdde94d36e8c1327fc2643e5905fea90be6c79f6a24140268d02fb9bc5eac7db855087e0", 0x88, 0xfffffffffffffffd}, {&(0x7f0000000200)="a4fed7eb854d771b3553c18f76dee60177a356a3c1969bfa76d8c7f81e8db6abc8a160fb08b9e6deb7fcb6f135c32ed0aab175ecf5cb8b7529e03e9b4424cf79e43019886434cadac27903486c4d35c35098df04e87029c2a5f991e82b7fc096afb0e3b91e6f2f2b1964c94b7473a48640c725ee09408348fde5cf7152e71b666791ace57f7484c512256b", 0x8b, 0x1000}, {&(0x7f00000002c0)="3da505a3393051fec731e30fd7cc1424b33ed95fd6d078228b5905e39d12696ba50322b86559a74a1f956354b30f7cbab46c3137af7b321611b57be4c4029104fd85d1ba6b2361cf0b0864b2cfe19a703218584b979022315306df59b02f83", 0x5f}, {&(0x7f0000000340)="b4bf0e6c221ae8c2a4b5303880b981a0b253786c4951b382abe14f7b2b7d72bd29eda79ff42c4c596d4a387c768e5314a57cfdf6a761bbd5952319d75ff6f8407406f3028fb343e423fe9a831beda8f145a71af5c800037170d1bfb811b2290f08723412cb54ba973c78e849f1c63153247d98a517a2f19f308046908fa8a89869080531f173cd4cf03695af725c1a68829d39b9e934bd240574746bcc8f075190d5505938eef4726a05e3522cb07347a2b8d3c69b089ff6070f", 0xba, 0x6}, {&(0x7f0000000400)="f87fc97a8e24edab05d7659bc2347224f8b1021e8cb7f963a01f1d831bc8f8bf0fa4e70b20c53c0ca244ca322a8ecbcf1a9cfa1efb0a45a19634862a0c09e00b611c6f0188e928e556eeed4d83a3aa8e5df62f576ba4285c3f3667b5ae1ed7050aab81aed940bc12b419909bc5deea5164445f00d9a90b426a29cd50e41b663ca1a340dc38c1a566548f92ce013739660209ee9d559d0bbfa84e2164295ed2f13f790e816cfeda5cf61f37d44706ea", 0xaf, 0x6}], 0x801440, &(0x7f0000000540)={[{@fat=@uid={'uid', 0x3d, r2}}, {@dots='dots'}], [{@hash='hash'}, {@dont_appraise='dont_appraise'}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) 19:24:26 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x0, 'queue0\x00', 0x8}) 19:24:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x400, 0x4) listen(r0, 0x8120) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e2f6669ab4e5a70"], 0x3138) 19:24:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1c00, 0x0, 0x0, 0x0, 0x0) 19:24:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x204100) getsockname$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0xffffffffffffffb3) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast1, @multicast2}, &(0x7f0000000180)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bond0\x00', r2}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="3321202e2f640092c5e607713eafcb4908a3316c65300a"], 0x3138) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000240)={0x8001001, 0xb8d, 0x2}) [ 508.073086][T15826] XFS (loop3): Invalid superblock magic number 19:24:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 508.273969][T15943] XFS (loop1): Invalid superblock magic number 19:24:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1a, 0x101000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x8000, 0xac4, 0x100000001}, &(0x7f00000000c0)=0x14) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in={{0x2, 0x4e24, @local}}}, 0x84) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000498c0000000000"], 0x3138) 19:24:26 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00'}) 19:24:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="3321202e2f66696c65300a144fdf142a75c52099c24bef6cce141a9504bc5f59f9b05047ad9d479aa0195424101f1132fddf9c040a712e44cc140000c1f5750353e75942bd38eab6065b8026f1223963c17bac09ad576097d5759097ec0c9621083e741613beb86c55fd2df82b8bc3a00d0660ab9e322840a0b6836314f7bb470ff232a7299d98"], 0x3138) 19:24:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1a, 0x101000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x8000, 0xac4, 0x100000001}, &(0x7f00000000c0)=0x14) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in={{0x2, 0x4e24, @local}}}, 0x84) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000498c0000000000"], 0x3138) 19:24:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1c02, 0x0, 0x0, 0x0, 0x0) 19:24:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) recvmmsg(r1, &(0x7f0000002940)=[{{&(0x7f00000000c0)=@nfc_llcp, 0x80, &(0x7f0000001240)=[{&(0x7f0000000140)=""/204, 0xcc}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x2}, 0x9}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001440)=[{&(0x7f0000001300)=""/42, 0x2a}, {&(0x7f0000001340)=""/103, 0x67}, {&(0x7f00000013c0)=""/52, 0x34}, {&(0x7f0000001400)=""/31, 0x1f}], 0x4, &(0x7f0000001480)=""/85, 0x55}, 0xfffffffffffffffd}, {{&(0x7f0000001500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002840)=[{&(0x7f0000001580)=""/142, 0x8e}, {&(0x7f0000001640)=""/91, 0x5b}, {&(0x7f00000016c0)=""/84, 0x54}, {&(0x7f0000001740)=""/254, 0xfe}, {&(0x7f0000001840)=""/4096, 0x1000}], 0x5, &(0x7f00000028c0)=""/126, 0x7e}, 0x8}], 0x3, 0x1, &(0x7f0000002a00)) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:27 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:27 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00'}) [ 509.066372][T16205] XFS (loop3): Invalid superblock magic number 19:24:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x23c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = dup(r0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000040000000100010000000000020000000000000009000000000000000700070000000000000000ffffff000000000300000000000000ff0300000000000008000000000000000200000000000000030000000000000002000000000000ff0f00000000000000e394008000000000fdffffffffffffffd3235c66f7c007170e3d2835f8bb2685b62dea7fe61edbd951ef2d52fda3831b8fdd3f3898044f93d6bba5eb24f1392e2b1d49a46b46f739cfdf2ab6d08dfe8d65f0e62432b3e554cdf3ea3719b5da736ff11dba9e3d8a748a277cac4df65972993af9cab3c6fa79d041cc0ba9db2c07817de0189a1ecf17"]) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e2f66fff1ebd0ca"], 0x3138) [ 509.339906][T16226] XFS (loop1): Invalid superblock magic number 19:24:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:27 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xe19b, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0xfffffffffffffffa, 0x5ed, 0x401, 0x20, 0x1, 0x3}, 0x119) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r3, &(0x7f0000002ec0)={'3! ', './file0'}, 0xb) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)={0x0, @speck128, 0x0, "57d0e79d9c42cdf9"}) 19:24:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) 19:24:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) [ 509.936016][T16471] XFS (loop3): Invalid superblock magic number 19:24:28 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:28 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00'}) 19:24:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:24:28 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:24:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 510.214925][T16590] XFS (loop1): Invalid superblock magic number 19:24:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:28 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x2010, 0x0, 0x0, 0x0, 0x0) 19:24:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:28 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x0, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x6, @local, 0xfffffffffffffffa}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000100)=""/71, &(0x7f0000000000)=0x47) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="b99176c540454e2f743db2a75aea02a084d9d2dd60f29760c861fc8deb7b6799c8ccd3e94deca84f0b58512d31db923daa7ee2f0b8b15ad4093acb95809497cc816db2b74402c58b0eb53c9260b46765156bd4e63038c501dcca5f9891ceea1001eaa68073a0f73af6daf30000000000"], 0x3138) 19:24:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 510.920975][T16769] XFS (loop3): Invalid superblock magic number 19:24:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0xfffffffffffffffe, 0x0) readahead(r1, 0x9, 0xffffffffffffffff) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000080)={[0x2, 0x15001, 0x2, 0x6000], 0x0, 0x1, 0xffffffff}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x8, 0x400680) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 511.085892][T16852] XFS (loop1): Invalid superblock magic number 19:24:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:29 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x117, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000003c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000440)={0x1, "d0a4ac9bd669198ad1d4f26a377fd91a2cf92c61ee1e32c25b8035cd9546b79b", 0x1, 0x2, 0x7, 0x7, 0x8, 0x3, 0x7fffffff, 0x7}) ioctl(r0, 0x1, &(0x7f0000000140)="84562237b80632db5abc12d4bfd02fdce1de02161f6548b2ee70ed46c9d358b3ebf6e7a4426497d226ad01212f560cb94fb1ecaa063acd3fedb6fc44cf833d8c6147a6bea307210d8d25087774e55a23693432780f1338beaf791060") r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x4, @remote, 0x9}, 0x1c) r4 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000300)={0x401, 0x7}) write$binfmt_script(r3, &(0x7f0000002ec0)=ANY=[@ANYBLOB], 0x3138) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x6, 0x4}, &(0x7f0000000080)=0xc) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x2000, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000400)=0x6, 0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r6, 0x111, 0x5, 0x80000000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r6, 0xc0945662, &(0x7f0000000200)={0x0, 0x0, [], {0x0, @bt={0x0, 0x4274, 0x0, 0x2, 0x40, 0x6, 0x268, 0x6, 0x9, 0x8000, 0x7f, 0x0, 0x9, 0x9, 0x10, 0x8}}}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r5, 0x7fff}, &(0x7f0000000100)=0x8) 19:24:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x2300, 0x0, 0x0, 0x0, 0x0) 19:24:29 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:30 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:30 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 512.018866][T16912] XFS (loop1): Invalid superblock magic number [ 512.034451][T16907] XFS (loop3): Invalid superblock magic number 19:24:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:24:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:30 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(0x0, 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x2800, 0x0, 0x0, 0x0, 0x0) 19:24:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:31 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x3, 0x70, 0x0, 0x7, 0x8001, 0x200, 0x0, 0x800, 0x80000, 0x2, 0x100, 0xe3, 0x7, 0x6d98, 0x0, 0x55, 0x6, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffff7f, 0x273, 0x800, 0xfff, 0x8001, 0x0, 0x6, 0xffffffff, 0x9a5, 0x364, 0x0, 0xfffffffffffffffd, 0x7f, 0x7f, 0x81, 0x0, 0x9, 0x0, 0x8000, 0x3, @perf_bp={0x0, 0xd}, 0x1, 0x3, 0x101, 0x0, 0x500000, 0x8, 0x4}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r3, r1, 0x0, 0x0, 0x0}, 0x30) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(r4, &(0x7f0000000000)={0x4}, 0x8) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r6 = fcntl$getown(r4, 0x9) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x4, 0xe5b8, 0x8, 0x7f, 0x0, 0x5, 0x40000, 0x5, 0x8, 0x4, 0x80, 0x3, 0xffffffff, 0x5, 0x2, 0x2, 0x25e3, 0xfffffffffffffffd, 0x1, 0x3ee0, 0x3, 0xffffffffffffff1e, 0x4, 0xfff, 0xb4, 0x4, 0x100, 0x1ff, 0x8, 0x3, 0x1, 0x3, 0x40, 0x6, 0x2, 0x0, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x11, 0x8000, 0x2, 0xc, 0x9, 0x7fffffff, 0x5d}, r6, 0xc, r4, 0x1) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x3138) prctl$PR_CAP_AMBIENT(0x2f, 0x5, 0x4) 19:24:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) [ 513.133757][T17171] XFS (loop1): Invalid superblock magic number [ 513.167141][T17175] XFS (loop3): Invalid superblock magic number 19:24:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) fremovexattr(r0, &(0x7f0000000000)=@random={'system.', '3! '}) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8000, 0x1) 19:24:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x3200, 0x0, 0x0, 0x0, 0x0) 19:24:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000100000002, 0x0) sendmmsg(r1, &(0x7f0000002000)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}, {{&(0x7f00000009c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x303000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x9, @empty, 0x2}, @in6={0xa, 0x4e22, 0x8, @empty, 0x39}, @in6={0xa, 0x4e21, 0x1fe000000, @empty, 0x2}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e23, 0x1ff, @mcast2, 0x3}], 0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x3, 0x8, 0x1, 0x9, 0x0, 0x9, 0x4000, 0x1, 0xfffffffffffffffd, 0x4, 0x100, 0xf2, 0x400, 0x3, 0x3f, 0xfff, 0x5, 0x71c, 0x4, 0x40, 0x3, 0x8000, 0x0, 0x4, 0x0, 0x5b, 0x0, 0x2, 0x9, 0x80000000, 0x10001, 0x6, 0x1, 0xfe9, 0x428, 0x8, 0x0, 0x100000001, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x1200, 0x13c, 0x0, 0x9, 0x7, 0x9a40, 0x8}, r3, 0x9, r0, 0xf) 19:24:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 514.109923][T17336] XFS (loop1): Invalid superblock magic number [ 514.156464][T17341] XFS (loop3): Invalid superblock magic number 19:24:32 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x20005ff8) 19:24:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f00000001c0)={0x5, 0x10001, 0x3, 0x9, 0xffffffffffffffff, 0xfffffffffffffffd, 0x9, 0x3}, &(0x7f0000000200)={0x9, 0x0, 0x9, 0x1, 0xfff, 0x9, 0x276, 0x1}, &(0x7f0000000240)={0x0, 0x3f, 0x81, 0x33, 0x9, 0xffffffff00000000, 0x9, 0x1}, &(0x7f0000000280)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x2400, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000300)=""/4096, &(0x7f0000001300)=0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x100000001, @remote, 0x8}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="edc3c9a364b750d765300a"], 0x3138) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000140)=0x4) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000080)="e81237ff125e4fba357b768f10a3c66e96b26d2f078f630388058ebc6c692b3c7fe7dbf8a7bf0eca9d37880ee8b549ec9710ecb8b69903aa6b146b4b3132b2f91d9219f1765b75ff45f663fc25136b03f98dfb3542aa99de58e21ed4f98c773f36643cf5566617c9c6228d58773438c7a2ba2ef474b0f6f1f5564dda8257b54f232f3aeb19b00d1a797c460c97522af29c336a30c32fdeb0c3b6f2c293572f241f8cf26a98372eb9923850507bbf8ba2f61d77f7df0913697a85679b1e94", 0xbe) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000001340)={0x0, 0x3, 0x4}, &(0x7f0000001380)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000013c0)={r3, 0x2d7}, &(0x7f0000001400)=0x8) 19:24:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x315e) 19:24:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x2bc0) 19:24:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x3601, 0x0, 0x0, 0x0, 0x0) 19:24:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:32 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2", 0x6a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3!1', './file0'}, 0x3138) 19:24:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0', [], 0xfffffffd}, 0x3138) 19:24:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 515.059044][T17410] XFS (loop3): Invalid superblock magic number [ 515.092934][T17415] XFS (loop1): Invalid superblock magic number 19:24:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'31^', './file0'}, 0x3138) 19:24:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3!v', './file0'}, 0x3138) 19:24:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 19:24:34 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c", 0x3d, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:24:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) rt_tgsigqueueinfo(r4, r5, 0x6, &(0x7f0000000680)={0x14, 0x9}) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) sendto$inet(r6, &(0x7f0000000340)="98dc6b3a15b4c90e3291111caa2449df1ea669be32231e1ca7be954a0cb638e0dc5725cddf6f3da52d3f4cc9f4c58c6142fa2a8c", 0x34, 0x20000000, &(0x7f00000003c0)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:37 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x6, 0x0, &(0x7f0000000140)) 19:24:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}, 0x0) 19:24:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) 19:24:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:37 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x7, 0x0, &(0x7f0000000140)) 19:24:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local}, 0x20) fstatfs(r0, &(0x7f0000000040)=""/52) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x30) fcntl$setstatus(r1, 0x4, 0x42803) [ 519.752526][T18055] XFS (loop1): Invalid superblock magic number 19:24:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 519.801698][T18064] XFS (loop3): Invalid superblock magic number 19:24:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x8, 0x0, &(0x7f0000000140)) 19:24:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:38 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r0, r2, r2}, &(0x7f0000000780)=""/240, 0xf0, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x6f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f0000000340), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x3, 0x12, 0x1c, 'rose0\x00', 'teql0\x00', 'bridge0\x00', 'bcsh0\x00', @random="fe4711ce55ea", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="06eff7b04485", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xf0, 0x120, 0x250, [@cluster={'cluster\x00', 0x10, {{0x9, 0xae5, 0xffff, 0x1}}}, @limit={'limit\x00', 0x20, {{0xbe48, 0xffffffff80000001, 0x8, 0x7fff, 0x100, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7fff, 'system_u:object_r:getty_log_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x1, 0x60, 'veth1_to_hsr\x00', 'veth0\x00', 'veth1_to_team\x00', 'veth1_to_hsr\x00', @dev={[], 0xf}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0x2a}, [0xff, 0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@mark_m={'mark_m\x00', 0x18, {{0xb8f, 0x58d75211, 0x1, 0x3}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x20, 0x86dd, 'netdevsim0\x00', 'nr0\x00', 'lo\x00', 'nlmon0\x00', @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0xff, 0xff], 0xe8, 0x148, 0x178, [@ip6={'ip6\x00', 0x50, {{@mcast1, @empty, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], [0xff0000ff, 0xffffff00], 0x0, 0x4, 0x40, 0x1, 0x4e20, 0x4e20, 0x4e21, 0x4e23}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xfffffffffffffff8}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x14, 0x8efb, 'lapb0\x00', 'lo\x00', 'ip6_vti0\x00', 'bridge_slave_1\x00', @broadcast, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x22}, [0xff, 0xff, 0x0, 0xff], 0x158, 0x158, 0x188, [@ip6={'ip6\x00', 0x50, {{@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xffffffff, 0xff, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xffffffff, 0xff0000ff], 0x1, 0xbb, 0x2, 0x2, 0x4e23, 0x4e20, 0x4e20, 0x4e24}}}, @rateest={'rateest\x00', 0x48, {{'ip6tnl0\x00', 'gre0\x00', 0x0, 0x1, 0x73, 0xc5, 0x8, 0x8000, 0xd7b9, 0x3f}}}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x11}}}}]}]}, 0x768) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x9, 0x0, &(0x7f0000000140)) 19:24:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) 19:24:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0xa, 0x0, &(0x7f0000000140)) 19:24:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0x66) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 19:24:38 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x7}) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000340)=0x3, 0x4) [ 520.582867][T18324] XFS (loop1): Invalid superblock magic number 19:24:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:24:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0xb, 0x0, &(0x7f0000000140)) 19:24:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x14, r1, 0x101}, 0x14}}, 0x0) 19:24:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0xc, 0x0, &(0x7f0000000140)) [ 520.835762][T18385] XFS (loop3): Invalid superblock magic number 19:24:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4e00, 0x0, 0x0, 0x0, 0x0) 19:24:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0xd, 0x0, &(0x7f0000000140)) 19:24:39 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) connect(r0, 0x0, 0xfffffffffffffdbd) io_setup(0x6, &(0x7f0000000280)) io_pgetevents(0x0, 0xd212, 0x0, 0x0, &(0x7f0000000340), 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) mkdir(0x0, 0x1) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f00000000c0)) r1 = gettid() syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x400000) clone(0x20120000, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) move_pages(r1, 0x6, &(0x7f00000002c0)=[&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000e00000/0x200000)=nil, &(0x7f0000f2c000/0x1000)=nil], &(0x7f0000000300)=[0x0, 0x9, 0x63, 0xa000000], 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) timer_create(0x2, &(0x7f0000000140)={0x0, 0x17, 0x0, @thr={&(0x7f0000000040)="e71b0e9cd6abd91b603f1a9c145082e8619149ff23b52450f7e66835a9280e26ac9ccb9327be3f0b93042609fa", 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) bind$isdn(r0, &(0x7f0000000080)={0x22, 0x0, 0x6, 0x401, 0x3}, 0x6) r2 = syz_open_procfs(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$key(0xffffffffffffffff, 0x0, 0x0) tkill(r1, 0x14) socket$nl_generic(0x10, 0x3, 0x10) tkill(0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000240)={'ifb0\x00', {0x2, 0x4e20, @broadcast}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000580)) fstat(r3, 0x0) 19:24:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:39 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000680)={0x8, {{0x2, 0x4e22, @empty}}, 0x0, 0x1, [{{0x2, 0x4e21, @loopback}}]}, 0x110) [ 521.424613][T18593] XFS (loop1): Invalid superblock magic number 19:24:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0xe, 0x0, &(0x7f0000000140)) 19:24:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0xf, 0x0, &(0x7f0000000140)) [ 521.638131][T18704] sock: process `syz-executor.0' is using obsolete getsockopt SO_BSDCOMPAT 19:24:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 521.706610][T18692] XFS (loop3): Invalid superblock magic number 19:24:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 19:24:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x10, 0x0, &(0x7f0000000140)) [ 521.889978][T18741] binder: 18738:18741 transaction failed 29189/-22, size 24-8 line 2994 19:24:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x5c03, 0x0, 0x0, 0x0, 0x0) [ 522.269993][T18853] XFS (loop1): Invalid superblock magic number 19:24:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:40 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) 19:24:40 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xfe}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0xfffffffffffffcd7) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) [ 522.594281][T18881] binder: 18877:18881 transaction failed 29189/-22, size 24-8 line 2994 19:24:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:40 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x12, 0x0, &(0x7f0000000140)) [ 522.787985][T18897] XFS (loop3): Invalid superblock magic number 19:24:41 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x84, @rand_addr, 0x15, 0x0, 'rr\x00'}, 0x2c) 19:24:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) 19:24:41 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x13, 0x0, &(0x7f0000000140)) 19:24:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 523.104721][T19019] XFS (loop1): Invalid superblock magic number [ 523.289863][T19138] XFS (loop3): Invalid superblock magic number [ 523.582740][T19148] XFS (loop1): Invalid superblock magic number 19:24:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:41 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x14, 0x0, &(0x7f0000000140)) 19:24:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) getpeername(r0, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) recvmsg(0xffffffffffffffff, 0x0, 0x0) dup2(r0, r1) clock_gettime(0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getegid() ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) gettid() socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000001c0), 0x10) 19:24:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:41 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000340)) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x15, 0x0, &(0x7f0000000140)) 19:24:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 19:24:42 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 523.950708][T19204] XFS (loop3): Invalid superblock magic number 19:24:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x19, 0x0, &(0x7f0000000140)) [ 524.139767][T19297] binder: 19289:19297 transaction failed 29189/-22, size 0-8 line 2994 19:24:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 524.200392][ T7656] binder: undelivered TRANSACTION_ERROR: 29189 [ 524.255247][T19293] XFS (loop1): Invalid superblock magic number 19:24:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") prctl$PR_GET_TIMERSLACK(0x1e) 19:24:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000140)) 19:24:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:42 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) pipe2(&(0x7f00000006c0)={0xffffffffffffffff}, 0x84000) read$alg(r2, &(0x7f0000000700)=""/44, 0x2c) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000700)) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = socket$bt_cmtp(0x1f, 0x3, 0x5) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x10802, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f00000005c0), &(0x7f0000000680)=0x4) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f0000000340)=0x8, 0x2) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) splice(r1, &(0x7f00000003c0), r1, &(0x7f0000000400), 0x4, 0x8) 19:24:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1d, 0x0, &(0x7f0000000140)) 19:24:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) 19:24:43 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x7}) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000340)=0x3, 0x4) 19:24:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:43 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1e, 0x0, &(0x7f0000000140)) [ 524.912133][T19441] XFS (loop3): Invalid superblock magic number 19:24:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) [ 525.027843][T19458] XFS (loop1): Invalid superblock magic number [ 525.448946][T19579] XFS (loop3): Invalid superblock magic number 19:24:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:24:44 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x22, 0x0, &(0x7f0000000140)) 19:24:44 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000580)=0xe8) getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000780), &(0x7f00000007c0)) r4 = geteuid() mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x80000, &(0x7f0000000800)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,access=client,dont_hash,fowner>', @ANYRESDEC=r2, @ANYBLOB=',euid>', @ANYRESDEC=r3, @ANYBLOB='\x00:\x00\x00\x00', @ANYRESDEC=r4, @ANYBLOB=',fscontext=unconfined_u,\x00']) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r0, r5}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r6 = socket$unix(0x1, 0x3, 0x0) r7 = getpgrp(0xffffffffffffffff) getresgid(&(0x7f00000008c0), &(0x7f0000000900)=0x0, &(0x7f0000000940)) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000980)={r7, r4, r8}, 0xc) r9 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r9, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r9, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r9, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:44 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x7}) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000340)=0x3, 0x4) 19:24:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x7201, 0x0, 0x0, 0x0, 0x0) 19:24:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:24:44 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x23, 0x0, &(0x7f0000000140)) 19:24:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 526.089388][T19607] XFS (loop1): Invalid superblock magic number 19:24:44 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x24, 0x0, &(0x7f0000000140)) [ 526.163454][T19642] XFS (loop3): Invalid superblock magic number 19:24:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:44 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x25, 0x0, &(0x7f0000000140)) 19:24:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:44 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x26, 0x0, &(0x7f0000000140)) 19:24:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) 19:24:45 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x7}) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000340)=0x3, 0x4) 19:24:45 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000340)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe86) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0x40}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:45 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x27, 0x0, &(0x7f0000000140)) 19:24:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 527.082663][T19776] XFS (loop1): Invalid superblock magic number [ 527.110034][T19771] XFS (loop3): Invalid superblock magic number 19:24:45 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x28, 0x0, &(0x7f0000000140)) 19:24:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:45 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x29, 0x0, &(0x7f0000000140)) 19:24:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:45 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x2a, 0x0, &(0x7f0000000140)) 19:24:45 executing program 2 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) 19:24:45 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x90a02, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000680)="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", 0x169) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000003c0)) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) set_thread_area(&(0x7f0000000400)={0xa, 0xffffffffffffffff, 0x0, 0x80, 0x6, 0x69, 0xd087, 0x1, 0x8, 0x6}) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000480)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) fcntl$getown(r1, 0x9) [ 527.868640][T19938] FAULT_INJECTION: forcing a failure. [ 527.868640][T19938] name failslab, interval 1, probability 0, space 0, times 0 19:24:46 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x2b, 0x0, &(0x7f0000000140)) 19:24:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 527.965170][T19938] CPU: 1 PID: 19938 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 527.973473][T19938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.983704][T19938] Call Trace: [ 527.983737][T19938] dump_stack+0x172/0x1f0 [ 527.983759][T19938] should_fail.cold+0xa/0x15 [ 527.983777][T19938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.983795][T19938] ? ___might_sleep+0x163/0x280 [ 527.983817][T19938] __should_failslab+0x121/0x190 [ 528.011960][T19938] should_failslab+0x9/0x14 [ 528.016490][T19938] kmem_cache_alloc_node+0x264/0x710 [ 528.022034][T19938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.022056][T19938] __alloc_skb+0xd5/0x5e0 [ 528.022071][T19938] ? skb_trim+0x190/0x190 [ 528.022097][T19938] __ip6_append_data.isra.0+0x29ed/0x3600 [ 528.022119][T19938] ? rawv6_mh_filter_unregister+0x20/0x20 [ 528.048532][T19938] ? dst_output+0x180/0x180 [ 528.053236][T19938] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 528.058816][T19938] ip6_append_data+0x1e5/0x320 [ 528.063669][T19938] ? rawv6_mh_filter_unregister+0x20/0x20 [ 528.069411][T19938] ? rawv6_mh_filter_unregister+0x20/0x20 [ 528.075163][T19938] rawv6_sendmsg+0x1467/0x35e0 [ 528.079962][T19938] ? rawv6_getsockopt+0x150/0x150 [ 528.085052][T19938] ? is_bpf_text_address+0xac/0x170 [ 528.090273][T19938] ? find_held_lock+0x35/0x130 [ 528.095220][T19938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.100699][T19938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.106397][T19938] ? lockdep_hardirqs_on+0x418/0x5d0 [ 528.111700][T19938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.117183][T19938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.122752][T19938] ? lockdep_hardirqs_on+0x418/0x5d0 [ 528.128072][T19938] ? retint_kernel+0x2d/0x2d [ 528.132766][T19938] ? trace_hardirqs_on_caller+0x6a/0x220 [ 528.138696][T19938] ? retint_kernel+0x2d/0x2d [ 528.143392][T19938] inet_sendmsg+0x147/0x5d0 [ 528.147909][T19938] ? rawv6_getsockopt+0x150/0x150 [ 528.153070][T19938] ? inet_sendmsg+0x147/0x5d0 [ 528.157790][T19938] ? ipip_gro_receive+0x100/0x100 [ 528.162922][T19938] sock_sendmsg+0xdd/0x130 [ 528.167363][T19938] sock_write_iter+0x27c/0x3e0 [ 528.172165][T19938] ? sock_sendmsg+0x130/0x130 [ 528.176879][T19938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 528.183137][T19938] ? iov_iter_init+0xee/0x220 [ 528.187836][T19938] new_sync_write+0x4c7/0x760 [ 528.192551][T19938] ? default_llseek+0x2e0/0x2e0 [ 528.197425][T19938] ? __fget+0x381/0x550 [ 528.201613][T19938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.207869][T19938] ? security_file_permission+0x94/0x380 [ 528.213525][T19938] __vfs_write+0xe4/0x110 [ 528.217895][T19938] vfs_write+0x20c/0x580 [ 528.222159][T19938] ksys_write+0xea/0x1f0 [ 528.226422][T19938] ? __ia32_sys_read+0xb0/0xb0 [ 528.231293][T19938] ? do_syscall_64+0x26/0x610 [ 528.236127][T19938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.242392][T19938] ? do_syscall_64+0x26/0x610 [ 528.247105][T19938] __x64_sys_write+0x73/0xb0 [ 528.251810][T19938] do_syscall_64+0x103/0x610 [ 528.256420][T19938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.262337][T19938] RIP: 0033:0x458209 [ 528.266362][T19938] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.286239][T19938] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 528.294781][T19938] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 528.303116][T19938] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 528.311232][T19938] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 528.319407][T19938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 528.327480][T19938] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:46 executing program 2 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:24:46 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x2c, 0x0, &(0x7f0000000140)) [ 528.382407][T19942] XFS (loop1): Invalid superblock magic number [ 528.418191][T19945] XFS (loop3): Invalid superblock magic number 19:24:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 528.556381][T19977] FAULT_INJECTION: forcing a failure. [ 528.556381][T19977] name failslab, interval 1, probability 0, space 0, times 0 [ 528.597377][T19977] CPU: 1 PID: 19977 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 528.605419][T19977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.615499][T19977] Call Trace: [ 528.618920][T19977] dump_stack+0x172/0x1f0 [ 528.623427][T19977] should_fail.cold+0xa/0x15 [ 528.628055][T19977] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 528.633897][T19977] ? ___might_sleep+0x163/0x280 [ 528.638866][T19977] __should_failslab+0x121/0x190 [ 528.643919][T19977] should_failslab+0x9/0x14 [ 528.648450][T19977] kmem_cache_alloc_node_trace+0x270/0x720 [ 528.654810][T19977] __kmalloc_node_track_caller+0x3d/0x70 [ 528.660469][T19977] __kmalloc_reserve.isra.0+0x40/0xf0 [ 528.665953][T19977] __alloc_skb+0x10b/0x5e0 [ 528.670416][T19977] ? skb_trim+0x190/0x190 [ 528.674850][T19977] ? find_held_lock+0x35/0x130 [ 528.679752][T19977] ? ip6_mtu+0x2e6/0x460 [ 528.684120][T19977] __ip6_append_data.isra.0+0x29ed/0x3600 [ 528.689934][T19977] ? rawv6_mh_filter_unregister+0x20/0x20 [ 528.696408][T19977] ? dst_output+0x180/0x180 [ 528.701656][T19977] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 528.707236][T19977] ip6_append_data+0x1e5/0x320 [ 528.712032][T19977] ? rawv6_mh_filter_unregister+0x20/0x20 [ 528.717794][T19977] ? rawv6_mh_filter_unregister+0x20/0x20 [ 528.723554][T19977] rawv6_sendmsg+0x1467/0x35e0 [ 528.728362][T19977] ? rawv6_getsockopt+0x150/0x150 [ 528.733596][T19977] ? is_bpf_text_address+0xac/0x170 [ 528.738841][T19977] ? find_held_lock+0x35/0x130 [ 528.743826][T19977] ? is_bpf_text_address+0xac/0x170 [ 528.749049][T19977] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 528.754984][T19977] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 528.761569][T19977] ? __lockdep_free_key_range+0x120/0x120 [ 528.767335][T19977] inet_sendmsg+0x147/0x5d0 [ 528.772151][T19977] ? rawv6_getsockopt+0x150/0x150 [ 528.777362][T19977] ? inet_sendmsg+0x147/0x5d0 [ 528.782058][T19977] ? ipip_gro_receive+0x100/0x100 [ 528.787310][T19977] sock_sendmsg+0xdd/0x130 [ 528.791844][T19977] sock_write_iter+0x27c/0x3e0 [ 528.796819][T19977] ? sock_sendmsg+0x130/0x130 [ 528.801521][T19977] ? __fget+0x35a/0x550 [ 528.805722][T19977] ? find_held_lock+0x35/0x130 [ 528.810690][T19977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 528.817225][T19977] ? iov_iter_init+0xee/0x220 [ 528.822300][T19977] new_sync_write+0x4c7/0x760 [ 528.827049][T19977] ? default_llseek+0x2e0/0x2e0 [ 528.831927][T19977] ? __fget+0x381/0x550 [ 528.836131][T19977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.842481][T19977] ? security_file_permission+0x94/0x380 [ 528.848137][T19977] __vfs_write+0xe4/0x110 [ 528.852768][T19977] vfs_write+0x20c/0x580 [ 528.857409][T19977] ksys_write+0xea/0x1f0 [ 528.861779][T19977] ? __ia32_sys_read+0xb0/0xb0 [ 528.866936][T19977] ? do_syscall_64+0x26/0x610 [ 528.872043][T19977] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.878389][T19977] ? do_syscall_64+0x26/0x610 [ 528.883222][T19977] __x64_sys_write+0x73/0xb0 [ 528.887941][T19977] do_syscall_64+0x103/0x610 [ 528.893115][T19977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.899220][T19977] RIP: 0033:0x458209 [ 528.903584][T19977] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.923648][T19977] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 528.932091][T19977] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 528.941370][T19977] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 528.949619][T19977] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 528.958123][T19977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 528.966310][T19977] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:47 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x2d, 0x0, &(0x7f0000000140)) 19:24:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:24:47 executing program 2 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x8402, 0x0, 0x0, 0x0, 0x0) 19:24:47 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000780)={0x1, 0x80}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000680)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r5, r6) 19:24:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:47 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x2e, 0x0, &(0x7f0000000140)) [ 529.305071][T19997] FAULT_INJECTION: forcing a failure. [ 529.305071][T19997] name failslab, interval 1, probability 0, space 0, times 0 [ 529.335691][T19997] CPU: 0 PID: 19997 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 529.343730][T19997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.353807][T19997] Call Trace: [ 529.353835][T19997] dump_stack+0x172/0x1f0 [ 529.353856][T19997] should_fail.cold+0xa/0x15 [ 529.353873][T19997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 529.353893][T19997] ? ___might_sleep+0x163/0x280 [ 529.353944][T19997] __should_failslab+0x121/0x190 [ 529.353970][T19997] should_failslab+0x9/0x14 [ 529.372328][T19997] kmem_cache_alloc_node+0x264/0x710 [ 529.372348][T19997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.372366][T19997] __alloc_skb+0xd5/0x5e0 [ 529.372381][T19997] ? skb_trim+0x190/0x190 [ 529.372407][T19997] __ip6_append_data.isra.0+0x29ed/0x3600 [ 529.372428][T19997] ? rawv6_mh_filter_unregister+0x20/0x20 [ 529.372450][T19997] ? dst_output+0x180/0x180 [ 529.372465][T19997] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 529.372484][T19997] ip6_append_data+0x1e5/0x320 [ 529.393485][T19997] ? rawv6_mh_filter_unregister+0x20/0x20 [ 529.393506][T19997] ? rawv6_mh_filter_unregister+0x20/0x20 [ 529.393522][T19997] rawv6_sendmsg+0x1467/0x35e0 [ 529.393545][T19997] ? rawv6_getsockopt+0x150/0x150 [ 529.393568][T19997] ? is_bpf_text_address+0xac/0x170 [ 529.393582][T19997] ? find_held_lock+0x35/0x130 [ 529.393604][T19997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.408032][T19997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.408048][T19997] ? lockdep_hardirqs_on+0x418/0x5d0 [ 529.408069][T19997] ? retint_kernel+0x2d/0x2d [ 529.419561][T19997] ? trace_hardirqs_on_caller+0x6a/0x220 [ 529.419578][T19997] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 529.419595][T19997] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 529.419629][T19997] inet_sendmsg+0x147/0x5d0 [ 529.429941][T19997] ? rawv6_getsockopt+0x150/0x150 [ 529.456183][T19997] ? inet_sendmsg+0x147/0x5d0 [ 529.456199][T19997] ? ipip_gro_receive+0x100/0x100 [ 529.456221][T19997] sock_sendmsg+0xdd/0x130 [ 529.483032][T19997] sock_write_iter+0x27c/0x3e0 [ 529.483049][T19997] ? sock_sendmsg+0x130/0x130 [ 529.483072][T19997] ? __fget+0x35a/0x550 [ 529.499474][T19997] ? find_held_lock+0x35/0x130 [ 529.499490][T19997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 529.499503][T19997] ? iov_iter_init+0xee/0x220 [ 529.499525][T19997] new_sync_write+0x4c7/0x760 [ 529.510662][T19997] ? default_llseek+0x2e0/0x2e0 [ 529.510677][T19997] ? retint_kernel+0x2d/0x2d [ 529.510696][T19997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.510715][T19997] ? retint_kernel+0x2d/0x2d [ 529.510734][T19997] __vfs_write+0xe4/0x110 [ 529.510750][T19997] vfs_write+0x20c/0x580 [ 529.510767][T19997] ksys_write+0xea/0x1f0 [ 529.510781][T19997] ? __ia32_sys_read+0xb0/0xb0 [ 529.510800][T19997] __x64_sys_write+0x73/0xb0 [ 529.510813][T19997] ? do_syscall_64+0x5b/0x610 [ 529.510827][T19997] do_syscall_64+0x103/0x610 [ 529.510850][T19997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.622944][T19997] RIP: 0033:0x458209 [ 529.626859][T19997] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.647120][T19997] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 529.655681][T19997] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 529.663873][T19997] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 529.672068][T19997] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 529.685644][T19997] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 529.694058][T19997] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:47 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x2f, 0x0, &(0x7f0000000140)) [ 529.788475][T20001] XFS (loop3): Invalid superblock magic number 19:24:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) [ 529.889290][T20007] XFS (loop1): Invalid superblock magic number 19:24:48 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x30, 0x0, &(0x7f0000000140)) 19:24:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:48 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x31, 0x0, &(0x7f0000000140)) 19:24:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:48 executing program 2 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x8602, 0x0, 0x0, 0x0, 0x0) 19:24:48 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$get_security(0x11, r0, &(0x7f0000000700)=""/165, 0xa5) r2 = syz_open_dev$dspn(&(0x7f00000005c0)='/dev/dsp#\x00', 0x9, 0x22800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000980)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000b40)=ANY=[@ANYBLOB="24a30e95ba53eaf962020000", @ANYRES16=r3, @ANYBLOB="00002abd7000fddbdf2508000000300005002c000200080001001b000000080002000400000008000200e390c52be334501807000000080001001b000000280001001400010069623a69703667726574617030000000100001006574683a726f7365300000002400090008000200070000000800010039c100000800010000800000080001004ca400001c0001000c00010069623a65716c00000c0002000800010007000000140006000800010001000080040002000400020020000600040002000800010006000000040002000400020008000100ff0300001400010008000300000000000800030003000000bc0001000800030004000000100001007564703a73797a31000000004c000200080004000700000008000400040000000800040000000000080003007481000008000200ff01000008000400020000000800020067070000080003000080000008000300f30000001400020008000200f40000000800010007000000080003002009000038000400200001000a004e2400000099ff010000000000000000000040000001090000001400020002004e230000000000000000000000004800050008000100657468000c000200080002002affffff1400020008000100080000000800020052110000080001006574680014000200080003000900000008000400008000002c000600080001000400000008000100f8ffffff080001000100000008000100000000000800010000000000"], 0x224}, 0x1, 0x0, 0x0, 0x8005}, 0x4000804) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r0, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) accept4$vsock_stream(r5, &(0x7f00000007c0)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x80800) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000580)=0x4) writev(r5, &(0x7f00000008c0)=[{&(0x7f0000000800)="843dd36d48e34f4c5860923775d09c45b6d2ca3d4ac0e30fb4b7d4cfefdbe6333e6b7a935aa74d0757cba3f103084d90cfc6883435903f010ff7e24da69779afa2e112df8cbd901808124faed0e66246fd789c415b4787af47b89dfc5d7d2c60d7d1be5264f176122ef86601646eccd804863a42e1a42ce956c8b6b736160c4e075e8ec2304b612ce4", 0x89}], 0x1) write$P9_RVERSION(r2, &(0x7f0000000b00)={0x15, 0x65, 0xffff, 0x80, 0x8, '9P2000.u'}, 0x15) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000003c0)={0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}]}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:48 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x37, 0x0, &(0x7f0000000140)) 19:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) [ 530.713977][T20086] FAULT_INJECTION: forcing a failure. [ 530.713977][T20086] name failslab, interval 1, probability 0, space 0, times 0 19:24:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x38, 0x0, &(0x7f0000000140)) [ 530.797524][T20086] CPU: 0 PID: 20086 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 530.805682][T20086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.815758][T20086] Call Trace: [ 530.819215][T20086] dump_stack+0x172/0x1f0 [ 530.823811][T20086] should_fail.cold+0xa/0x15 [ 530.828554][T20086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 530.834882][T20086] ? ___might_sleep+0x163/0x280 [ 530.840061][T20086] __should_failslab+0x121/0x190 [ 530.845041][T20086] should_failslab+0x9/0x14 [ 530.849677][T20086] kmem_cache_alloc_node_trace+0x270/0x720 [ 530.856370][T20086] __kmalloc_node_track_caller+0x3d/0x70 [ 530.862128][T20086] __kmalloc_reserve.isra.0+0x40/0xf0 [ 530.867695][T20086] __alloc_skb+0x10b/0x5e0 [ 530.872478][T20086] ? skb_trim+0x190/0x190 [ 530.876870][T20086] ? raw6_getfrag+0x164/0x230 [ 530.882241][T20086] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 530.888117][T20086] __ip6_append_data.isra.0+0x29ed/0x3600 19:24:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x39, 0x0, &(0x7f0000000140)) [ 530.894008][T20086] ? rawv6_mh_filter_unregister+0x20/0x20 [ 530.899977][T20086] ? dst_output+0x180/0x180 [ 530.904513][T20086] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 530.910609][T20086] ip6_append_data+0x1e5/0x320 [ 530.915920][T20086] ? rawv6_mh_filter_unregister+0x20/0x20 [ 530.922025][T20086] ? rawv6_mh_filter_unregister+0x20/0x20 [ 530.928012][T20086] rawv6_sendmsg+0x1467/0x35e0 [ 530.932845][T20086] ? rawv6_getsockopt+0x150/0x150 [ 530.938090][T20086] ? __lockdep_free_key_range+0x120/0x120 [ 530.943963][T20086] ? __perf_event_task_sched_in+0x640/0x820 [ 530.949976][T20086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.956645][T20086] ? debug_smp_processor_id+0x3c/0x280 [ 530.962230][T20086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 530.967845][T20086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 530.973516][T20086] ? lockdep_hardirqs_on+0x418/0x5d0 [ 530.978928][T20086] ? retint_kernel+0x2d/0x2d [ 530.987086][T20086] ? trace_hardirqs_on_caller+0x6a/0x220 [ 530.993016][T20086] ? lock_downgrade+0x880/0x880 19:24:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 530.998164][T20086] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 531.004196][T20086] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 531.010870][T20086] ? security_socket_sendmsg+0x89/0xc0 [ 531.016710][T20086] inet_sendmsg+0x147/0x5d0 [ 531.016734][T20086] ? rawv6_getsockopt+0x150/0x150 [ 531.026271][T20086] ? inet_sendmsg+0x147/0x5d0 [ 531.026285][T20086] ? ipip_gro_receive+0x100/0x100 [ 531.026301][T20086] sock_sendmsg+0xdd/0x130 [ 531.026321][T20086] sock_write_iter+0x27c/0x3e0 [ 531.048115][T20086] ? sock_sendmsg+0x130/0x130 [ 531.052953][T20086] ? __fget+0x35a/0x550 [ 531.052969][T20086] ? find_held_lock+0x35/0x130 [ 531.052983][T20086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.052997][T20086] ? iov_iter_init+0xee/0x220 [ 531.053014][T20086] new_sync_write+0x4c7/0x760 [ 531.053031][T20086] ? default_llseek+0x2e0/0x2e0 [ 531.053055][T20086] ? retint_kernel+0x2d/0x2d [ 531.053081][T20086] __vfs_write+0xe4/0x110 [ 531.083380][T20086] vfs_write+0x20c/0x580 19:24:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000140)) [ 531.083403][T20086] ksys_write+0xea/0x1f0 [ 531.083419][T20086] ? __ia32_sys_read+0xb0/0xb0 [ 531.083441][T20086] ? do_syscall_64+0x26/0x610 [ 531.112043][T20086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.118475][T20086] ? do_syscall_64+0x26/0x610 [ 531.123287][T20086] __x64_sys_write+0x73/0xb0 [ 531.128099][T20086] do_syscall_64+0x103/0x610 [ 531.132995][T20086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.138939][T20086] RIP: 0033:0x458209 [ 531.142878][T20086] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.166386][T20086] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 531.175330][T20086] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 531.184148][T20086] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 531.192324][T20086] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 531.200707][T20086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 531.208838][T20086] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 531.244460][T20082] XFS (loop1): Invalid superblock magic number 19:24:49 executing program 2 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 531.285368][T20106] XFS (loop3): Invalid superblock magic number [ 531.378637][T20130] FAULT_INJECTION: forcing a failure. [ 531.378637][T20130] name failslab, interval 1, probability 0, space 0, times 0 [ 531.414505][T20130] CPU: 1 PID: 20130 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 531.422948][T20130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.433525][T20130] Call Trace: [ 531.436946][T20130] dump_stack+0x172/0x1f0 [ 531.441323][T20130] should_fail.cold+0xa/0x15 [ 531.446227][T20130] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 531.452340][T20130] ? ___might_sleep+0x163/0x280 [ 531.457371][T20130] __should_failslab+0x121/0x190 [ 531.462862][T20130] should_failslab+0x9/0x14 [ 531.467553][T20130] kmem_cache_alloc_node+0x264/0x710 [ 531.472846][T20130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.479677][T20130] ? ip_generic_getfrag+0x120/0x230 [ 531.485180][T20130] __alloc_skb+0xd5/0x5e0 [ 531.489793][T20130] ? skb_trim+0x190/0x190 [ 531.494130][T20130] ? raw6_getfrag+0x164/0x230 [ 531.498924][T20130] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 531.504717][T20130] __ip6_append_data.isra.0+0x29ed/0x3600 [ 531.510763][T20130] ? rawv6_mh_filter_unregister+0x20/0x20 [ 531.516509][T20130] ? dst_output+0x180/0x180 [ 531.521291][T20130] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 531.526864][T20130] ip6_append_data+0x1e5/0x320 [ 531.531674][T20130] ? rawv6_mh_filter_unregister+0x20/0x20 [ 531.537453][T20130] ? rawv6_mh_filter_unregister+0x20/0x20 [ 531.543442][T20130] rawv6_sendmsg+0x1467/0x35e0 [ 531.548235][T20130] ? rawv6_getsockopt+0x150/0x150 [ 531.553281][T20130] ? is_bpf_text_address+0xac/0x170 [ 531.558825][T20130] ? find_held_lock+0x35/0x130 [ 531.563615][T20130] ? is_bpf_text_address+0xac/0x170 [ 531.569159][T20130] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 531.575245][T20130] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 531.581872][T20130] ? __lockdep_free_key_range+0x120/0x120 [ 531.588217][T20130] inet_sendmsg+0x147/0x5d0 [ 531.593082][T20130] ? rawv6_getsockopt+0x150/0x150 [ 531.598119][T20130] ? inet_sendmsg+0x147/0x5d0 [ 531.602801][T20130] ? ipip_gro_receive+0x100/0x100 [ 531.608028][T20130] sock_sendmsg+0xdd/0x130 [ 531.612581][T20130] sock_write_iter+0x27c/0x3e0 [ 531.617525][T20130] ? sock_sendmsg+0x130/0x130 [ 531.622438][T20130] ? __fget+0x35a/0x550 [ 531.626695][T20130] ? find_held_lock+0x35/0x130 [ 531.631657][T20130] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.637992][T20130] ? iov_iter_init+0xee/0x220 [ 531.642673][T20130] new_sync_write+0x4c7/0x760 [ 531.647521][T20130] ? default_llseek+0x2e0/0x2e0 [ 531.652639][T20130] ? __fget+0x381/0x550 [ 531.656801][T20130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.663043][T20130] ? security_file_permission+0x94/0x380 [ 531.668937][T20130] __vfs_write+0xe4/0x110 [ 531.673611][T20130] vfs_write+0x20c/0x580 [ 531.677907][T20130] ksys_write+0xea/0x1f0 [ 531.682298][T20130] ? __ia32_sys_read+0xb0/0xb0 [ 531.687072][T20130] ? do_syscall_64+0x26/0x610 [ 531.691940][T20130] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.698290][T20130] ? do_syscall_64+0x26/0x610 [ 531.703068][T20130] __x64_sys_write+0x73/0xb0 [ 531.707676][T20130] do_syscall_64+0x103/0x610 [ 531.712420][T20130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.718405][T20130] RIP: 0033:0x458209 [ 531.722304][T20130] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.742154][T20130] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 531.750638][T20130] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 531.758675][T20130] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 531.766666][T20130] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 531.774858][T20130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 531.782935][T20130] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x8801, 0x0, 0x0, 0x0, 0x0) 19:24:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000140)) 19:24:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:50 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000680)=""/166) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x7) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:50 executing program 2 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3d, 0x0, &(0x7f0000000140)) 19:24:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 532.237105][T20145] XFS (loop1): Invalid superblock magic number [ 532.238904][T20161] FAULT_INJECTION: forcing a failure. [ 532.238904][T20161] name failslab, interval 1, probability 0, space 0, times 0 [ 532.310907][T20161] CPU: 1 PID: 20161 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 532.319080][T20161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.329233][T20161] Call Trace: [ 532.332605][T20161] dump_stack+0x172/0x1f0 [ 532.337302][T20161] should_fail.cold+0xa/0x15 [ 532.342000][T20161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 532.348085][T20161] ? ___might_sleep+0x163/0x280 [ 532.352954][T20161] __should_failslab+0x121/0x190 [ 532.357990][T20161] should_failslab+0x9/0x14 [ 532.362771][T20161] kmem_cache_alloc_node_trace+0x270/0x720 [ 532.368600][T20161] __kmalloc_node_track_caller+0x3d/0x70 [ 532.374264][T20161] __kmalloc_reserve.isra.0+0x40/0xf0 [ 532.379678][T20161] __alloc_skb+0x10b/0x5e0 [ 532.384108][T20161] ? skb_trim+0x190/0x190 [ 532.388551][T20161] ? raw6_getfrag+0x164/0x230 [ 532.393414][T20161] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 532.399181][T20161] __ip6_append_data.isra.0+0x29ed/0x3600 [ 532.404923][T20161] ? rawv6_mh_filter_unregister+0x20/0x20 [ 532.410692][T20161] ? dst_output+0x180/0x180 [ 532.415215][T20161] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 532.420843][T20161] ip6_append_data+0x1e5/0x320 [ 532.425713][T20161] ? rawv6_mh_filter_unregister+0x20/0x20 [ 532.431694][T20161] ? rawv6_mh_filter_unregister+0x20/0x20 [ 532.437456][T20161] rawv6_sendmsg+0x1467/0x35e0 [ 532.442248][T20161] ? rawv6_getsockopt+0x150/0x150 [ 532.447375][T20161] ? perf_event_update_userpage+0x582/0x810 [ 532.453372][T20161] ? perf_event_task_disable+0x120/0x120 [ 532.459089][T20161] ? kvm_clock_read+0x18/0x30 [ 532.463868][T20161] ? mark_held_locks+0xa4/0xf0 [ 532.468827][T20161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.474445][T20161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.479915][T20161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 532.485235][T20161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.490795][T20161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.496708][T20161] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 532.502744][T20161] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 532.509273][T20161] ? retint_kernel+0x2d/0x2d [ 532.513882][T20161] inet_sendmsg+0x147/0x5d0 [ 532.518392][T20161] ? rawv6_getsockopt+0x150/0x150 [ 532.523433][T20161] ? inet_sendmsg+0x147/0x5d0 [ 532.528115][T20161] ? ipip_gro_receive+0x100/0x100 [ 532.533153][T20161] sock_sendmsg+0xdd/0x130 [ 532.537595][T20161] sock_write_iter+0x27c/0x3e0 [ 532.542375][T20161] ? sock_sendmsg+0x130/0x130 [ 532.547073][T20161] ? __fget+0x35a/0x550 [ 532.551262][T20161] ? find_held_lock+0x35/0x130 [ 532.556214][T20161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.562472][T20161] ? iov_iter_init+0xee/0x220 [ 532.567169][T20161] new_sync_write+0x4c7/0x760 [ 532.571866][T20161] ? default_llseek+0x2e0/0x2e0 [ 532.576737][T20161] ? __fget+0x381/0x550 [ 532.580992][T20161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.587247][T20161] ? security_file_permission+0x94/0x380 [ 532.592915][T20161] __vfs_write+0xe4/0x110 [ 532.597274][T20161] vfs_write+0x20c/0x580 [ 532.601658][T20161] ksys_write+0xea/0x1f0 [ 532.606007][T20161] ? __ia32_sys_read+0xb0/0xb0 [ 532.610788][T20161] __x64_sys_write+0x73/0xb0 [ 532.615387][T20161] ? do_syscall_64+0x5b/0x610 [ 532.620075][T20161] do_syscall_64+0x103/0x610 [ 532.624710][T20161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.630610][T20161] RIP: 0033:0x458209 [ 532.634651][T20161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.654771][T20161] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 532.663195][T20161] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 532.671342][T20161] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 532.679541][T20161] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 532.687612][T20161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 532.695730][T20161] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3e, 0x0, &(0x7f0000000140)) 19:24:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) [ 532.795847][T20165] XFS (loop3): Invalid superblock magic number 19:24:51 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x42, 0x0, &(0x7f0000000140)) 19:24:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xc400, 0x0, 0x0, 0x0, 0x0) 19:24:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:51 executing program 2 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:51 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x43, 0x0, &(0x7f0000000140)) [ 533.219330][T20206] FAULT_INJECTION: forcing a failure. [ 533.219330][T20206] name failslab, interval 1, probability 0, space 0, times 0 [ 533.235256][T20206] CPU: 1 PID: 20206 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 533.243630][T20206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.253963][T20206] Call Trace: [ 533.253994][T20206] dump_stack+0x172/0x1f0 [ 533.254015][T20206] should_fail.cold+0xa/0x15 [ 533.254033][T20206] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.254051][T20206] ? ___might_sleep+0x163/0x280 [ 533.254073][T20206] __should_failslab+0x121/0x190 [ 533.266460][T20206] should_failslab+0x9/0x14 [ 533.266479][T20206] kmem_cache_alloc_node+0x264/0x710 [ 533.266496][T20206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.266519][T20206] ? ip_generic_getfrag+0x120/0x230 [ 533.282329][T20206] __alloc_skb+0xd5/0x5e0 [ 533.282347][T20206] ? skb_trim+0x190/0x190 [ 533.282367][T20206] ? raw6_getfrag+0x164/0x230 [ 533.292147][T20206] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 533.292174][T20206] __ip6_append_data.isra.0+0x29ed/0x3600 [ 533.292195][T20206] ? rawv6_mh_filter_unregister+0x20/0x20 [ 533.292224][T20206] ? dst_output+0x180/0x180 [ 533.339815][T20206] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 533.345372][T20206] ip6_append_data+0x1e5/0x320 [ 533.350209][T20206] ? rawv6_mh_filter_unregister+0x20/0x20 [ 533.356030][T20206] ? rawv6_mh_filter_unregister+0x20/0x20 [ 533.361874][T20206] rawv6_sendmsg+0x1467/0x35e0 [ 533.366797][T20206] ? rawv6_getsockopt+0x150/0x150 [ 533.371884][T20206] ? is_bpf_text_address+0xac/0x170 [ 533.377106][T20206] ? find_held_lock+0x35/0x130 [ 533.381879][T20206] ? is_bpf_text_address+0xac/0x170 [ 533.387313][T20206] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 533.393365][T20206] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 533.399849][T20206] ? __lockdep_free_key_range+0x120/0x120 [ 533.405887][T20206] inet_sendmsg+0x147/0x5d0 [ 533.410516][T20206] ? rawv6_getsockopt+0x150/0x150 [ 533.415658][T20206] ? inet_sendmsg+0x147/0x5d0 [ 533.420437][T20206] ? ipip_gro_receive+0x100/0x100 [ 533.425753][T20206] sock_sendmsg+0xdd/0x130 [ 533.430223][T20206] sock_write_iter+0x27c/0x3e0 [ 533.435409][T20206] ? sock_sendmsg+0x130/0x130 [ 533.440152][T20206] ? __fget+0x35a/0x550 [ 533.444544][T20206] ? find_held_lock+0x35/0x130 [ 533.449326][T20206] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 533.455656][T20206] ? iov_iter_init+0xee/0x220 [ 533.460477][T20206] new_sync_write+0x4c7/0x760 [ 533.465757][T20206] ? default_llseek+0x2e0/0x2e0 [ 533.471207][T20206] ? __fget+0x381/0x550 [ 533.475712][T20206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.482129][T20206] ? security_file_permission+0x94/0x380 [ 533.487832][T20206] __vfs_write+0xe4/0x110 [ 533.492185][T20206] vfs_write+0x20c/0x580 [ 533.496433][T20206] ksys_write+0xea/0x1f0 [ 533.500719][T20206] ? __ia32_sys_read+0xb0/0xb0 [ 533.505617][T20206] ? do_syscall_64+0x26/0x610 [ 533.510422][T20206] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.516611][T20206] ? do_syscall_64+0x26/0x610 [ 533.521299][T20206] __x64_sys_write+0x73/0xb0 [ 533.526183][T20206] do_syscall_64+0x103/0x610 [ 533.531175][T20206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.537162][T20206] RIP: 0033:0x458209 [ 533.541654][T20206] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.561966][T20206] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 533.570584][T20206] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 533.578755][T20206] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 533.587713][T20206] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 533.595722][T20206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 533.604966][T20206] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 533.668019][T20207] XFS (loop1): Invalid superblock magic number 19:24:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:51 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000680)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0x1e9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) openat$capi20(0xffffffffffffff9c, &(0x7f0000000340)='/dev/capi20\x00', 0x309000, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f00000003c0)={0x7fff, 0x9, 0x2, 'queue1\x00', 0x2008}) 19:24:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:51 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:24:51 executing program 2 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 533.793566][T20229] FAULT_INJECTION: forcing a failure. [ 533.793566][T20229] name failslab, interval 1, probability 0, space 0, times 0 [ 533.826427][T20229] CPU: 0 PID: 20229 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 533.834578][T20229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.844757][T20229] Call Trace: [ 533.848090][T20229] dump_stack+0x172/0x1f0 [ 533.852462][T20229] should_fail.cold+0xa/0x15 [ 533.857468][T20229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.863334][T20229] ? ___might_sleep+0x163/0x280 [ 533.868302][T20229] __should_failslab+0x121/0x190 [ 533.873445][T20229] should_failslab+0x9/0x14 [ 533.878055][T20229] kmem_cache_alloc_node_trace+0x270/0x720 [ 533.884127][T20229] __kmalloc_node_track_caller+0x3d/0x70 [ 533.884148][T20229] __kmalloc_reserve.isra.0+0x40/0xf0 [ 533.884167][T20229] __alloc_skb+0x10b/0x5e0 [ 533.895175][T20229] ? skb_trim+0x190/0x190 [ 533.904101][T20229] ? raw6_getfrag+0x164/0x230 [ 533.908979][T20229] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 533.909007][T20229] __ip6_append_data.isra.0+0x29ed/0x3600 [ 533.909033][T20229] ? rawv6_mh_filter_unregister+0x20/0x20 [ 533.926190][T20229] ? dst_output+0x180/0x180 [ 533.930906][T20229] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 533.936679][T20229] ip6_append_data+0x1e5/0x320 [ 533.941727][T20229] ? rawv6_mh_filter_unregister+0x20/0x20 [ 533.947477][T20229] ? rawv6_mh_filter_unregister+0x20/0x20 [ 533.953264][T20229] rawv6_sendmsg+0x1467/0x35e0 [ 533.958124][T20229] ? rawv6_getsockopt+0x150/0x150 [ 533.963549][T20229] ? is_bpf_text_address+0xac/0x170 [ 533.969485][T20229] ? find_held_lock+0x35/0x130 [ 533.974320][T20229] ? is_bpf_text_address+0xac/0x170 [ 533.979591][T20229] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 533.985633][T20229] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 533.992354][T20229] ? __lockdep_free_key_range+0x120/0x120 [ 533.998205][T20229] inet_sendmsg+0x147/0x5d0 [ 534.002850][T20229] ? rawv6_getsockopt+0x150/0x150 [ 534.008011][T20229] ? inet_sendmsg+0x147/0x5d0 [ 534.012816][T20229] ? ipip_gro_receive+0x100/0x100 [ 534.017951][T20229] sock_sendmsg+0xdd/0x130 [ 534.022399][T20229] sock_write_iter+0x27c/0x3e0 [ 534.027204][T20229] ? sock_sendmsg+0x130/0x130 [ 534.031999][T20229] ? __fget+0x35a/0x550 [ 534.032018][T20229] ? find_held_lock+0x35/0x130 [ 534.032032][T20229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 534.032044][T20229] ? iov_iter_init+0xee/0x220 [ 534.032063][T20229] new_sync_write+0x4c7/0x760 [ 534.032078][T20229] ? default_llseek+0x2e0/0x2e0 [ 534.032099][T20229] ? __fget+0x381/0x550 [ 534.032120][T20229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.032136][T20229] ? security_file_permission+0x94/0x380 [ 534.032153][T20229] __vfs_write+0xe4/0x110 [ 534.032169][T20229] vfs_write+0x20c/0x580 [ 534.032189][T20229] ksys_write+0xea/0x1f0 [ 534.047754][T20229] ? __ia32_sys_read+0xb0/0xb0 [ 534.047773][T20229] ? do_syscall_64+0x26/0x610 [ 534.047795][T20229] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.107739][T20229] ? do_syscall_64+0x26/0x610 [ 534.112640][T20229] __x64_sys_write+0x73/0xb0 [ 534.117348][T20229] do_syscall_64+0x103/0x610 [ 534.122162][T20229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.128239][T20229] RIP: 0033:0x458209 [ 534.132253][T20229] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.151967][T20229] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 534.160673][T20229] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 534.169550][T20229] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 534.177741][T20229] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 534.185926][T20229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 19:24:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:24:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:52 executing program 2 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 534.194056][T20229] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 534.333518][T20253] FAULT_INJECTION: forcing a failure. [ 534.333518][T20253] name failslab, interval 1, probability 0, space 0, times 0 [ 534.369005][T20253] CPU: 0 PID: 20253 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 534.377127][T20253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.387222][T20253] Call Trace: [ 534.390557][T20253] dump_stack+0x172/0x1f0 [ 534.395011][T20253] should_fail.cold+0xa/0x15 [ 534.399693][T20253] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 534.405622][T20253] ? ___might_sleep+0x163/0x280 [ 534.410685][T20253] __should_failslab+0x121/0x190 [ 534.415741][T20253] should_failslab+0x9/0x14 [ 534.420618][T20253] kmem_cache_alloc_node+0x264/0x710 [ 534.425925][T20253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.432442][T20253] ? ip_generic_getfrag+0x120/0x230 [ 534.437965][T20253] __alloc_skb+0xd5/0x5e0 [ 534.442309][T20253] ? skb_trim+0x190/0x190 [ 534.446771][T20253] ? raw6_getfrag+0x164/0x230 [ 534.451509][T20253] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 534.457426][T20253] __ip6_append_data.isra.0+0x29ed/0x3600 [ 534.463348][T20253] ? rawv6_mh_filter_unregister+0x20/0x20 [ 534.469297][T20253] ? dst_output+0x180/0x180 [ 534.473990][T20253] ip6_append_data+0x1e5/0x320 [ 534.478802][T20253] ? rawv6_mh_filter_unregister+0x20/0x20 [ 534.484734][T20253] ? rawv6_mh_filter_unregister+0x20/0x20 [ 534.490839][T20253] rawv6_sendmsg+0x1467/0x35e0 [ 534.495633][T20253] ? rawv6_getsockopt+0x150/0x150 [ 534.500691][T20253] ? is_bpf_text_address+0xac/0x170 [ 534.506522][T20253] ? find_held_lock+0x35/0x130 [ 534.511298][T20253] ? is_bpf_text_address+0xac/0x170 [ 534.511318][T20253] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 534.511334][T20253] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 534.511357][T20253] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.511379][T20253] inet_sendmsg+0x147/0x5d0 [ 534.511393][T20253] ? rawv6_getsockopt+0x150/0x150 [ 534.511403][T20253] ? inet_sendmsg+0x147/0x5d0 [ 534.511416][T20253] ? ipip_gro_receive+0x100/0x100 [ 534.511433][T20253] sock_sendmsg+0xdd/0x130 [ 534.511448][T20253] sock_write_iter+0x27c/0x3e0 [ 534.511463][T20253] ? sock_sendmsg+0x130/0x130 [ 534.511514][T20253] ? __fget+0x35a/0x550 [ 534.571785][T20232] XFS (loop3): Invalid superblock magic number [ 534.572107][T20253] ? find_held_lock+0x35/0x130 [ 534.588258][T20253] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 534.594913][T20253] ? iov_iter_init+0xee/0x220 [ 534.599880][T20253] new_sync_write+0x4c7/0x760 [ 534.604765][T20253] ? default_llseek+0x2e0/0x2e0 [ 534.609750][T20253] ? retint_kernel+0x2d/0x2d [ 534.614486][T20253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.620924][T20253] ? security_file_permission+0x94/0x380 [ 534.626638][T20253] ? rw_verify_area+0xb2/0x360 [ 534.631613][T20253] __vfs_write+0xe4/0x110 [ 534.635968][T20253] vfs_write+0x20c/0x580 [ 534.640346][T20253] ksys_write+0xea/0x1f0 [ 534.645046][T20253] ? __ia32_sys_read+0xb0/0xb0 [ 534.649919][T20253] ? do_syscall_64+0x26/0x610 [ 534.649935][T20253] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.649952][T20253] ? do_syscall_64+0x26/0x610 [ 534.665768][T20253] __x64_sys_write+0x73/0xb0 [ 534.665787][T20253] do_syscall_64+0x103/0x610 [ 534.665807][T20253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.681638][T20253] RIP: 0033:0x458209 [ 534.685817][T20253] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.706002][T20253] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 534.714437][T20253] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 534.723012][T20253] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 534.731011][T20253] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 534.739362][T20253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 534.747807][T20253] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xca00, 0x0, 0x0, 0x0, 0x0) 19:24:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x100000001, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x9, @sdr={0x0, 0x100000000}}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) 19:24:53 executing program 5: r0 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x3, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xe49}}, [0x5, 0x9, 0x3f, 0xfffffffffffffa7f, 0x0, 0xffff, 0x9, 0x101, 0xfff, 0x2, 0x10000, 0x475a, 0x6, 0x400]}, &(0x7f0000000780)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000007c0)={r1, 0x48da, 0x40}, &(0x7f0000000800)=0x8) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, &(0x7f0000000580)=@chain={'key_or_keyring:', r2, ':chain\x00'}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r2, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) write$binfmt_elf64(r3, &(0x7f0000000ac0)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffffffffffe1, 0x5, 0x9, 0x1000, 0x101, 0x3, 0x6, 0xef9, 0x264, 0x40, 0x157, 0x80, 0xfffffffffffff000, 0x38, 0x1, 0x0, 0xffffffff, 0x62a}, [{0x7, 0x4, 0x9c5d, 0x3, 0x3, 0x2, 0xfff, 0x2}, {0x70000000, 0x4, 0xfff, 0x7, 0x4, 0x1, 0x8, 0x20}], "650721b6a08afea9c49c4d429cc283d2b474fa2044690d43fe69102fbe47ac966dfcdc5e92f49ccd7676a6ad4077492c543428f336ad6b5ccec27572d79cd2a39948cec699c0c577456d51187d3538b61f804a743da89bd0a458c3d280e149f863132f66025d5d355f6a36ec1c1eaecf9ed698495c8481dd1a34e984f4785428bebffde655eed7cceb668933430422c79ec314b7357445f69ed9781dd4c4802b0d407248269c588886ff4782428074f912cc7f873a9107c6"}, 0x168) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) recvfrom$rxrpc(r4, &(0x7f00000003c0)=""/98, 0x62, 0x10000, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r2, r5}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000900)={0x7c, 0x9, 0x4, 'queue0\x00', 0xc}) [ 535.108258][T20272] XFS (loop1): Invalid superblock magic number 19:24:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:53 executing program 2 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:24:53 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x2000) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'teql0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, r2, 0x3}, 0xc) [ 535.266707][T20289] FAULT_INJECTION: forcing a failure. [ 535.266707][T20289] name failslab, interval 1, probability 0, space 0, times 0 [ 535.285391][T20289] CPU: 0 PID: 20289 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 535.293598][T20289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.303914][T20289] Call Trace: [ 535.307238][T20289] dump_stack+0x172/0x1f0 [ 535.311609][T20289] should_fail.cold+0xa/0x15 19:24:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200040, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000100)={0xe3, &(0x7f0000000180)="f0b34e8da7773ab138b0fba5b31d7c1f33f81beeed657a4527bd091c17cf2e5235898f25013c4ccda969c5b2668292085665de73b755cff8614820ddb6446510a3e08331c3575e8ff68ec5398e8f2d9187af6eee692e63617028978082fa7e78c12f57f95d4dc3671052752eeb781f9c4f6d8e135d74f7780c972276b52450134ee8da9bcaf031e925dc7386f9385ed177e51b6cf96e2e16e7c67f8dba48aec94e2b5a53048859a0108261c9c03445c09028f65e9dffb41f6f5dc0df66d6c9b7e14a854a739a5eee9648204f1103031304606b6241387dfee43300ff796b4e43053a2c"}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000280)={0x7e5a, 0x7f}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x72ba, 0x8200, 0x100, 0x80, r2}, 0x10) sched_yield() getsockopt$sock_buf(r0, 0x1, 0x400000001c, 0x0, &(0x7f0000000140)) 19:24:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) [ 535.316234][T20289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 535.322108][T20289] ? ___might_sleep+0x163/0x280 [ 535.327215][T20289] __should_failslab+0x121/0x190 [ 535.332491][T20289] should_failslab+0x9/0x14 [ 535.337038][T20289] kmem_cache_alloc_node_trace+0x270/0x720 [ 535.342974][T20289] __kmalloc_node_track_caller+0x3d/0x70 [ 535.342992][T20289] __kmalloc_reserve.isra.0+0x40/0xf0 [ 535.343008][T20289] __alloc_skb+0x10b/0x5e0 [ 535.343021][T20289] ? skb_trim+0x190/0x190 [ 535.343037][T20289] ? raw6_getfrag+0x164/0x230 [ 535.343050][T20289] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 535.343072][T20289] __ip6_append_data.isra.0+0x29ed/0x3600 [ 535.343091][T20289] ? rawv6_mh_filter_unregister+0x20/0x20 [ 535.343116][T20289] ? dst_output+0x180/0x180 [ 535.343133][T20289] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 535.343153][T20289] ip6_append_data+0x1e5/0x320 [ 535.369282][T20289] ? rawv6_mh_filter_unregister+0x20/0x20 [ 535.407811][T20289] ? rawv6_mh_filter_unregister+0x20/0x20 [ 535.413589][T20289] rawv6_sendmsg+0x1467/0x35e0 [ 535.418567][T20289] ? rawv6_getsockopt+0x150/0x150 [ 535.423706][T20289] ? is_bpf_text_address+0xac/0x170 [ 535.423721][T20289] ? find_held_lock+0x35/0x130 [ 535.423734][T20289] ? is_bpf_text_address+0xac/0x170 [ 535.423754][T20289] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 535.423771][T20289] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 535.423795][T20289] ? __lockdep_free_key_range+0x120/0x120 [ 535.423817][T20289] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 535.439211][T20289] inet_sendmsg+0x147/0x5d0 [ 535.439228][T20289] ? rawv6_getsockopt+0x150/0x150 [ 535.439239][T20289] ? inet_sendmsg+0x147/0x5d0 [ 535.439256][T20289] ? ipip_gro_receive+0x100/0x100 [ 535.483540][T20289] sock_sendmsg+0xdd/0x130 [ 535.488015][T20289] sock_write_iter+0x27c/0x3e0 [ 535.492807][T20289] ? sock_sendmsg+0x130/0x130 [ 535.497516][T20289] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 535.503771][T20289] ? iov_iter_init+0xee/0x220 [ 535.508473][T20289] new_sync_write+0x4c7/0x760 [ 535.513182][T20289] ? default_llseek+0x2e0/0x2e0 19:24:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) [ 535.518076][T20289] ? retint_kernel+0x2d/0x2d [ 535.522799][T20289] __vfs_write+0xe4/0x110 [ 535.527257][T20289] vfs_write+0x20c/0x580 [ 535.531703][T20289] ksys_write+0xea/0x1f0 [ 535.535973][T20289] ? __ia32_sys_read+0xb0/0xb0 [ 535.541620][T20289] __x64_sys_write+0x73/0xb0 [ 535.546445][T20289] ? do_syscall_64+0x5b/0x610 [ 535.551423][T20289] do_syscall_64+0x103/0x610 [ 535.556320][T20289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.562236][T20289] RIP: 0033:0x458209 [ 535.566161][T20289] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.586632][T20289] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 535.596488][T20289] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 535.605008][T20289] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 19:24:53 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x100) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x442}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)={0x9c, r2, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x53f8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x1) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r0, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 535.613046][T20289] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 535.621172][T20289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 535.629256][T20289] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 535.664209][T20294] XFS (loop3): Invalid superblock magic number 19:24:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) 19:24:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20380, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:24:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:24:54 executing program 2 (fault-call:3 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 536.097673][T20334] FAULT_INJECTION: forcing a failure. [ 536.097673][T20334] name failslab, interval 1, probability 0, space 0, times 0 [ 536.117359][T20334] CPU: 1 PID: 20334 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 536.125541][T20334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.125548][T20334] Call Trace: [ 536.125573][T20334] dump_stack+0x172/0x1f0 [ 536.125596][T20334] should_fail.cold+0xa/0x15 [ 536.148077][T20334] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.153953][T20334] ? ___might_sleep+0x163/0x280 [ 536.159016][T20334] __should_failslab+0x121/0x190 [ 536.163981][T20334] should_failslab+0x9/0x14 [ 536.168502][T20334] kmem_cache_alloc_node+0x264/0x710 [ 536.173804][T20334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.180707][T20334] ? ip_generic_getfrag+0x120/0x230 [ 536.186063][T20334] __alloc_skb+0xd5/0x5e0 [ 536.186081][T20334] ? skb_trim+0x190/0x190 [ 536.186099][T20334] ? raw6_getfrag+0x164/0x230 [ 536.186112][T20334] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 536.186135][T20334] __ip6_append_data.isra.0+0x29ed/0x3600 [ 536.211178][T20334] ? rawv6_mh_filter_unregister+0x20/0x20 [ 536.216939][T20334] ? dst_output+0x180/0x180 [ 536.221464][T20334] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 536.227034][T20334] ip6_append_data+0x1e5/0x320 [ 536.231829][T20334] ? rawv6_mh_filter_unregister+0x20/0x20 [ 536.237582][T20334] ? rawv6_mh_filter_unregister+0x20/0x20 [ 536.243414][T20334] rawv6_sendmsg+0x1467/0x35e0 [ 536.248231][T20334] ? rawv6_getsockopt+0x150/0x150 [ 536.253281][T20334] ? is_bpf_text_address+0xac/0x170 [ 536.258499][T20334] ? find_held_lock+0x35/0x130 [ 536.263280][T20334] ? is_bpf_text_address+0xac/0x170 [ 536.268503][T20334] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 536.274741][T20334] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 536.281530][T20334] ? __lockdep_free_key_range+0x120/0x120 [ 536.287272][T20334] inet_sendmsg+0x147/0x5d0 [ 536.291811][T20334] ? rawv6_getsockopt+0x150/0x150 [ 536.296844][T20334] ? inet_sendmsg+0x147/0x5d0 [ 536.301772][T20334] ? ipip_gro_receive+0x100/0x100 [ 536.306919][T20334] sock_sendmsg+0xdd/0x130 [ 536.311500][T20334] sock_write_iter+0x27c/0x3e0 [ 536.316301][T20334] ? sock_sendmsg+0x130/0x130 [ 536.321112][T20334] ? __fget+0x35a/0x550 [ 536.325383][T20334] ? find_held_lock+0x35/0x130 [ 536.330437][T20334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 536.336876][T20334] ? iov_iter_init+0xee/0x220 [ 536.341616][T20334] new_sync_write+0x4c7/0x760 [ 536.346350][T20334] ? default_llseek+0x2e0/0x2e0 [ 536.351440][T20334] ? __fget+0x381/0x550 [ 536.355711][T20334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.362153][T20334] ? security_file_permission+0x94/0x380 [ 536.367808][T20334] __vfs_write+0xe4/0x110 [ 536.372362][T20334] vfs_write+0x20c/0x580 [ 536.376631][T20334] ksys_write+0xea/0x1f0 [ 536.380898][T20334] ? __ia32_sys_read+0xb0/0xb0 [ 536.385685][T20334] ? do_syscall_64+0x26/0x610 [ 536.390396][T20334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.396680][T20334] ? do_syscall_64+0x26/0x610 [ 536.401558][T20334] __x64_sys_write+0x73/0xb0 [ 536.406258][T20334] do_syscall_64+0x103/0x610 [ 536.411023][T20334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.417027][T20334] RIP: 0033:0x458209 [ 536.420952][T20334] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 536.441664][T20334] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 536.450288][T20334] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 536.458343][T20334] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 536.466433][T20334] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 536.466443][T20334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 536.466451][T20334] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:54 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendfile(r0, r0, &(0x7f0000000000)=0x4b, 0x20) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$vcsn(&(0x7f0000006940)='/dev/vcs#\x00', 0x4, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000006980)={0x1}, 0x4) 19:24:54 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000340)) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r0}, &(0x7f00000009c0)=""/240, 0xffffffffffffff74, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:54 executing program 2 (fault-call:3 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) [ 536.649635][T20331] XFS (loop1): Invalid superblock magic number 19:24:54 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 536.691950][T20362] FAULT_INJECTION: forcing a failure. [ 536.691950][T20362] name failslab, interval 1, probability 0, space 0, times 0 [ 536.738115][T20362] CPU: 1 PID: 20362 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 536.746605][T20362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.756939][T20362] Call Trace: [ 536.756970][T20362] dump_stack+0x172/0x1f0 [ 536.756995][T20362] should_fail.cold+0xa/0x15 [ 536.757012][T20362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.757033][T20362] ? ___might_sleep+0x163/0x280 [ 536.757051][T20362] __should_failslab+0x121/0x190 [ 536.757073][T20362] should_failslab+0x9/0x14 [ 536.790206][T20362] kmem_cache_alloc_node_trace+0x270/0x720 [ 536.796053][T20362] __kmalloc_node_track_caller+0x3d/0x70 [ 536.801808][T20362] __kmalloc_reserve.isra.0+0x40/0xf0 [ 536.807313][T20362] __alloc_skb+0x10b/0x5e0 [ 536.807333][T20362] ? skb_trim+0x190/0x190 [ 536.807351][T20362] ? raw6_getfrag+0x164/0x230 [ 536.807370][T20362] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 536.826979][T20362] __ip6_append_data.isra.0+0x29ed/0x3600 [ 536.832732][T20362] ? rawv6_mh_filter_unregister+0x20/0x20 [ 536.838861][T20362] ? dst_output+0x180/0x180 [ 536.843400][T20362] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 536.848986][T20362] ip6_append_data+0x1e5/0x320 [ 536.854476][T20362] ? rawv6_mh_filter_unregister+0x20/0x20 [ 536.860222][T20362] ? rawv6_mh_filter_unregister+0x20/0x20 [ 536.865967][T20362] rawv6_sendmsg+0x1467/0x35e0 [ 536.870779][T20362] ? rawv6_getsockopt+0x150/0x150 [ 536.875834][T20362] ? is_bpf_text_address+0xac/0x170 [ 536.881626][T20362] ? find_held_lock+0x35/0x130 [ 536.886512][T20362] ? is_bpf_text_address+0xac/0x170 [ 536.891888][T20362] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 536.898330][T20362] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 536.904842][T20362] ? __lockdep_free_key_range+0x120/0x120 [ 536.910615][T20362] inet_sendmsg+0x147/0x5d0 [ 536.915141][T20362] ? rawv6_getsockopt+0x150/0x150 [ 536.920303][T20362] ? inet_sendmsg+0x147/0x5d0 [ 536.924994][T20362] ? ipip_gro_receive+0x100/0x100 [ 536.925015][T20362] sock_sendmsg+0xdd/0x130 [ 536.925032][T20362] sock_write_iter+0x27c/0x3e0 [ 536.925053][T20362] ? sock_sendmsg+0x130/0x130 [ 536.944676][T20362] ? __fget+0x35a/0x550 [ 536.944696][T20362] ? find_held_lock+0x35/0x130 [ 536.944711][T20362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 536.944725][T20362] ? iov_iter_init+0xee/0x220 [ 536.944744][T20362] new_sync_write+0x4c7/0x760 [ 536.944761][T20362] ? default_llseek+0x2e0/0x2e0 [ 536.944782][T20362] ? __fget+0x381/0x550 [ 536.989947][T20362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.996204][T20362] ? security_file_permission+0x94/0x380 [ 537.001849][T20362] __vfs_write+0xe4/0x110 [ 537.006239][T20362] vfs_write+0x20c/0x580 [ 537.010513][T20362] ksys_write+0xea/0x1f0 [ 537.014765][T20362] ? __ia32_sys_read+0xb0/0xb0 [ 537.014785][T20362] ? do_syscall_64+0x26/0x610 [ 537.014801][T20362] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.014816][T20362] ? do_syscall_64+0x26/0x610 [ 537.014835][T20362] __x64_sys_write+0x73/0xb0 [ 537.014857][T20362] do_syscall_64+0x103/0x610 [ 537.039734][T20362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.039748][T20362] RIP: 0033:0x458209 [ 537.039764][T20362] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.039778][T20362] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 19:24:55 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7f, 0x40) ioctl$TIOCEXCL(r0, 0x540c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x0, @time={0x77359400}, 0x0, {0x3, 0xfffffffffffff994}, 0x4ad, 0x3, 0x9}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) socket$packet(0x11, 0x0, 0x300) [ 537.082962][T20362] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 537.090947][T20362] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 537.098936][T20362] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 537.106925][T20362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 537.115001][T20362] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 537.185697][T20359] XFS (loop3): Invalid superblock magic number 19:24:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xf000, 0x0, 0x0, 0x0, 0x0) 19:24:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:55 executing program 0: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, @random}]}) 19:24:55 executing program 2 (fault-call:3 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 537.473140][T20394] FAULT_INJECTION: forcing a failure. [ 537.473140][T20394] name failslab, interval 1, probability 0, space 0, times 0 [ 537.566607][T20394] CPU: 0 PID: 20394 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 537.574638][T20394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.584792][T20394] Call Trace: [ 537.588098][T20394] dump_stack+0x172/0x1f0 [ 537.592432][T20394] should_fail.cold+0xa/0x15 [ 537.597017][T20394] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.603090][T20394] ? ___might_sleep+0x163/0x280 [ 537.607931][T20394] __should_failslab+0x121/0x190 [ 537.612858][T20394] should_failslab+0x9/0x14 [ 537.617346][T20394] kmem_cache_alloc_node+0x264/0x710 [ 537.622629][T20394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.628851][T20394] ? ip_generic_getfrag+0x120/0x230 [ 537.634072][T20394] __alloc_skb+0xd5/0x5e0 [ 537.638400][T20394] ? skb_trim+0x190/0x190 [ 537.642720][T20394] ? raw6_getfrag+0x164/0x230 [ 537.647387][T20394] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 537.653095][T20394] __ip6_append_data.isra.0+0x29ed/0x3600 [ 537.658802][T20394] ? rawv6_mh_filter_unregister+0x20/0x20 [ 537.664514][T20394] ? dst_output+0x180/0x180 [ 537.669017][T20394] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 537.674637][T20394] ip6_append_data+0x1e5/0x320 [ 537.679479][T20394] ? rawv6_mh_filter_unregister+0x20/0x20 [ 537.685190][T20394] ? rawv6_mh_filter_unregister+0x20/0x20 [ 537.690917][T20394] rawv6_sendmsg+0x1467/0x35e0 [ 537.695683][T20394] ? rawv6_getsockopt+0x150/0x150 [ 537.700709][T20394] ? is_bpf_text_address+0xac/0x170 [ 537.705893][T20394] ? find_held_lock+0x35/0x130 [ 537.710645][T20394] ? is_bpf_text_address+0xac/0x170 [ 537.715831][T20394] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 537.721707][T20394] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 537.728111][T20394] ? __lockdep_free_key_range+0x120/0x120 [ 537.733822][T20394] inet_sendmsg+0x147/0x5d0 [ 537.738310][T20394] ? rawv6_getsockopt+0x150/0x150 [ 537.743314][T20394] ? inet_sendmsg+0x147/0x5d0 [ 537.747978][T20394] ? ipip_gro_receive+0x100/0x100 [ 537.752991][T20394] sock_sendmsg+0xdd/0x130 [ 537.757404][T20394] sock_write_iter+0x27c/0x3e0 [ 537.762154][T20394] ? sock_sendmsg+0x130/0x130 [ 537.766914][T20394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 537.773135][T20394] ? iov_iter_init+0xee/0x220 [ 537.777802][T20394] new_sync_write+0x4c7/0x760 [ 537.782469][T20394] ? default_llseek+0x2e0/0x2e0 [ 537.787322][T20394] ? __fget+0x381/0x550 [ 537.791475][T20394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.797702][T20394] ? security_file_permission+0x94/0x380 [ 537.803324][T20394] __vfs_write+0xe4/0x110 [ 537.807641][T20394] vfs_write+0x20c/0x580 [ 537.811880][T20394] ksys_write+0xea/0x1f0 [ 537.816114][T20394] ? __ia32_sys_read+0xb0/0xb0 [ 537.820865][T20394] ? do_syscall_64+0x26/0x610 [ 537.825527][T20394] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.831572][T20394] ? do_syscall_64+0x26/0x610 [ 537.836235][T20394] __x64_sys_write+0x73/0xb0 [ 537.840823][T20394] do_syscall_64+0x103/0x610 [ 537.845860][T20394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.851735][T20394] RIP: 0033:0x458209 [ 537.855621][T20394] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.875218][T20394] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 537.883712][T20394] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 537.892115][T20394] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 537.900072][T20394] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 537.908048][T20394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 537.916004][T20394] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:56 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000400)=@assoc_value={0x0}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000005c0)={r3, 0x5, 0x4, 0x861}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r0, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) gettid() openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x2000, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1c5000, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x20, 0x2, 0x8000}, 0x4) 19:24:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:24:56 executing program 2 (fault-call:3 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 537.987830][T20402] XFS (loop1): Invalid superblock magic number [ 538.099299][T20423] FAULT_INJECTION: forcing a failure. [ 538.099299][T20423] name failslab, interval 1, probability 0, space 0, times 0 [ 538.159576][T20423] CPU: 1 PID: 20423 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 538.167616][T20423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.177703][T20423] Call Trace: [ 538.177732][T20423] dump_stack+0x172/0x1f0 [ 538.177762][T20423] should_fail.cold+0xa/0x15 [ 538.177784][T20423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.189979][T20423] ? ___might_sleep+0x163/0x280 [ 538.190002][T20423] __should_failslab+0x121/0x190 [ 538.190025][T20423] should_failslab+0x9/0x14 [ 538.210179][T20423] kmem_cache_alloc_node_trace+0x270/0x720 [ 538.216028][T20423] __kmalloc_node_track_caller+0x3d/0x70 [ 538.221725][T20423] __kmalloc_reserve.isra.0+0x40/0xf0 [ 538.227138][T20423] __alloc_skb+0x10b/0x5e0 [ 538.231576][T20423] ? skb_trim+0x190/0x190 [ 538.235911][T20423] ? raw6_getfrag+0x164/0x230 [ 538.240598][T20423] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 538.246335][T20423] __ip6_append_data.isra.0+0x29ed/0x3600 [ 538.252070][T20423] ? rawv6_mh_filter_unregister+0x20/0x20 [ 538.257815][T20423] ? dst_output+0x180/0x180 [ 538.262524][T20423] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 538.268101][T20423] ip6_append_data+0x1e5/0x320 [ 538.272887][T20423] ? rawv6_mh_filter_unregister+0x20/0x20 [ 538.278628][T20423] ? rawv6_mh_filter_unregister+0x20/0x20 [ 538.284369][T20423] rawv6_sendmsg+0x1467/0x35e0 [ 538.289173][T20423] ? rawv6_getsockopt+0x150/0x150 [ 538.294234][T20423] ? is_bpf_text_address+0xac/0x170 [ 538.299447][T20423] ? find_held_lock+0x35/0x130 [ 538.304228][T20423] ? is_bpf_text_address+0xac/0x170 [ 538.309544][T20423] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 538.315472][T20423] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 538.321921][T20423] ? __lockdep_free_key_range+0x120/0x120 [ 538.327663][T20423] inet_sendmsg+0x147/0x5d0 [ 538.332185][T20423] ? rawv6_getsockopt+0x150/0x150 [ 538.337223][T20423] ? inet_sendmsg+0x147/0x5d0 [ 538.341991][T20423] ? ipip_gro_receive+0x100/0x100 [ 538.347028][T20423] sock_sendmsg+0xdd/0x130 [ 538.351460][T20423] sock_write_iter+0x27c/0x3e0 [ 538.356238][T20423] ? sock_sendmsg+0x130/0x130 [ 538.360928][T20423] ? __fget+0x35a/0x550 [ 538.365963][T20423] ? find_held_lock+0x35/0x130 [ 538.370799][T20423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.377054][T20423] ? iov_iter_init+0xee/0x220 [ 538.381841][T20423] new_sync_write+0x4c7/0x760 [ 538.386528][T20423] ? default_llseek+0x2e0/0x2e0 [ 538.391403][T20423] ? __fget+0x381/0x550 [ 538.395570][T20423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.401815][T20423] ? security_file_permission+0x94/0x380 [ 538.407478][T20423] __vfs_write+0xe4/0x110 [ 538.411825][T20423] vfs_write+0x20c/0x580 [ 538.416075][T20423] ksys_write+0xea/0x1f0 [ 538.420332][T20423] ? __ia32_sys_read+0xb0/0xb0 [ 538.425100][T20423] ? do_syscall_64+0x26/0x610 [ 538.429782][T20423] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.435854][T20423] ? do_syscall_64+0x26/0x610 [ 538.440540][T20423] __x64_sys_write+0x73/0xb0 [ 538.445149][T20423] do_syscall_64+0x103/0x610 [ 538.450181][T20423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.456074][T20423] RIP: 0033:0x458209 [ 538.459991][T20423] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.479687][T20423] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 538.488108][T20423] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 538.496095][T20423] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 19:24:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:24:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000000)={0x6, 0x7}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:24:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_buf(r0, 0x1, 0x3f, 0x0, &(0x7f0000000140)=0xfffffffffffffc91) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)=0x10000) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000040)={@remote, @empty}, 0x8) [ 538.504081][T20423] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 538.512162][T20423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 538.520400][T20423] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 538.635436][T20428] XFS (loop3): Invalid superblock magic number 19:24:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xf003, 0x0, 0x0, 0x0, 0x0) 19:24:56 executing program 0: r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x7, 0x6, 0x5, 0xf9, 0x6b}, 0x14) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x8000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000300)="9161f98f6ff1794cd398dcba1b226ad1d8a606729c4e900bda07706f465807566ca4704938e9918a0f648f96dd4a46dcd54d904b41e703e9335df7fffd904809637d3d90133f2fe8dada177403315478db2a2b9f25a005cdbd339e80d1fd8b9720b1648e9ea89ea105230ed3", 0x6c, 0x1}], 0x800000, &(0x7f0000000380)={[{@shortname_win95='shortname=win95'}, {@uni_xlate='uni_xlate=1'}, {@rodir='rodir'}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}, {@uni_xlate='uni_xlate=1'}, {@rodir='rodir'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlateno='uni_xlate=0'}], [{@fsname={'fsname', 0x3d, 'GPLvmnet1'}}]}) r2 = msgget(0x2, 0x4) msgsnd(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0x1, 0x800) 19:24:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:24:56 executing program 2 (fault-call:3 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 538.817972][T20456] FAT-fs (loop0): Unrecognized mount option "fsname=GPLvmnet1" or missing value [ 538.924984][T20474] FAULT_INJECTION: forcing a failure. [ 538.924984][T20474] name failslab, interval 1, probability 0, space 0, times 0 [ 538.991041][T20463] XFS (loop1): Invalid superblock magic number [ 538.999366][T20474] CPU: 0 PID: 20474 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 539.007551][T20474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.017614][T20474] Call Trace: [ 539.020947][T20474] dump_stack+0x172/0x1f0 [ 539.025395][T20474] should_fail.cold+0xa/0x15 [ 539.029981][T20474] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.035805][T20474] ? __should_failslab+0x79/0x190 [ 539.040837][T20474] __should_failslab+0x121/0x190 [ 539.045852][T20474] should_failslab+0x9/0x14 [ 539.050361][T20474] kmem_cache_alloc_node+0x264/0x710 [ 539.055652][T20474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.061904][T20474] ? ip_generic_getfrag+0x120/0x230 [ 539.067116][T20474] __alloc_skb+0xd5/0x5e0 [ 539.071462][T20474] ? skb_trim+0x190/0x190 [ 539.075785][T20474] ? raw6_getfrag+0x164/0x230 [ 539.080454][T20474] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 539.086196][T20474] __ip6_append_data.isra.0+0x29ed/0x3600 [ 539.091942][T20474] ? rawv6_mh_filter_unregister+0x20/0x20 [ 539.097678][T20474] ? dst_output+0x180/0x180 [ 539.102190][T20474] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 539.107739][T20474] ip6_append_data+0x1e5/0x320 [ 539.112497][T20474] ? rawv6_mh_filter_unregister+0x20/0x20 [ 539.118232][T20474] ? rawv6_mh_filter_unregister+0x20/0x20 [ 539.123962][T20474] rawv6_sendmsg+0x1467/0x35e0 [ 539.128739][T20474] ? rawv6_getsockopt+0x150/0x150 [ 539.133788][T20474] ? __lockdep_free_key_range+0x120/0x120 [ 539.139503][T20474] ? lock_downgrade+0x880/0x880 [ 539.144349][T20474] ? finish_task_switch+0x146/0x780 [ 539.151851][T20474] ? find_held_lock+0x35/0x130 [ 539.156717][T20474] ? finish_task_switch+0x146/0x780 [ 539.161909][T20474] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.167380][T20474] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.172839][T20474] ? lockdep_hardirqs_on+0x418/0x5d0 [ 539.178120][T20474] ? retint_kernel+0x2d/0x2d [ 539.182700][T20474] ? trace_hardirqs_on_caller+0x6a/0x220 [ 539.188328][T20474] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 539.194206][T20474] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 539.200627][T20474] inet_sendmsg+0x147/0x5d0 [ 539.205119][T20474] ? rawv6_getsockopt+0x150/0x150 [ 539.210134][T20474] ? inet_sendmsg+0x147/0x5d0 [ 539.214802][T20474] ? ipip_gro_receive+0x100/0x100 [ 539.219811][T20474] sock_sendmsg+0xdd/0x130 [ 539.224233][T20474] sock_write_iter+0x27c/0x3e0 [ 539.228987][T20474] ? sock_sendmsg+0x130/0x130 [ 539.233655][T20474] ? __fget+0x35a/0x550 [ 539.238591][T20474] ? find_held_lock+0x35/0x130 [ 539.243338][T20474] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.249560][T20474] ? iov_iter_init+0xee/0x220 [ 539.254238][T20474] new_sync_write+0x4c7/0x760 [ 539.258919][T20474] ? default_llseek+0x2e0/0x2e0 [ 539.263760][T20474] ? retint_kernel+0x2d/0x2d [ 539.268346][T20474] __vfs_write+0xe4/0x110 [ 539.272665][T20474] vfs_write+0x20c/0x580 [ 539.276904][T20474] ksys_write+0xea/0x1f0 [ 539.281137][T20474] ? __ia32_sys_read+0xb0/0xb0 [ 539.285892][T20474] ? do_syscall_64+0x26/0x610 [ 539.290564][T20474] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.296624][T20474] ? do_syscall_64+0x26/0x610 [ 539.301289][T20474] __x64_sys_write+0x73/0xb0 [ 539.305878][T20474] do_syscall_64+0x103/0x610 [ 539.310455][T20474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.316337][T20474] RIP: 0033:0x458209 [ 539.320227][T20474] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.339820][T20474] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 539.348218][T20474] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 539.356180][T20474] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 539.364243][T20474] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 539.372199][T20474] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 539.380160][T20474] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:24:57 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000680)="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", 0x1a3) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:57 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x18000, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:24:57 executing program 2 (fault-call:3 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) [ 539.495349][T20491] FAULT_INJECTION: forcing a failure. [ 539.495349][T20491] name failslab, interval 1, probability 0, space 0, times 0 [ 539.555719][T20491] CPU: 1 PID: 20491 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 539.563729][T20491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.563737][T20491] Call Trace: [ 539.563765][T20491] dump_stack+0x172/0x1f0 [ 539.563789][T20491] should_fail.cold+0xa/0x15 [ 539.563809][T20491] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.563826][T20491] ? ___might_sleep+0x163/0x280 [ 539.563843][T20491] __should_failslab+0x121/0x190 19:24:57 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x20000, 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}}) [ 539.563858][T20491] should_failslab+0x9/0x14 [ 539.563879][T20491] kmem_cache_alloc_node_trace+0x270/0x720 [ 539.612243][T20491] __kmalloc_node_track_caller+0x3d/0x70 [ 539.617887][T20491] __kmalloc_reserve.isra.0+0x40/0xf0 [ 539.617908][T20491] __alloc_skb+0x10b/0x5e0 [ 539.617925][T20491] ? skb_trim+0x190/0x190 [ 539.617947][T20491] ? raw6_getfrag+0x164/0x230 [ 539.636963][T20491] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 539.642887][T20491] __ip6_append_data.isra.0+0x29ed/0x3600 [ 539.648637][T20491] ? rawv6_mh_filter_unregister+0x20/0x20 [ 539.654387][T20491] ? dst_output+0x180/0x180 [ 539.658914][T20491] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 539.658935][T20491] ip6_append_data+0x1e5/0x320 [ 539.669223][T20491] ? rawv6_mh_filter_unregister+0x20/0x20 [ 539.674975][T20491] ? rawv6_mh_filter_unregister+0x20/0x20 [ 539.680707][T20491] rawv6_sendmsg+0x1467/0x35e0 [ 539.685487][T20491] ? rawv6_getsockopt+0x150/0x150 [ 539.685517][T20491] ? is_bpf_text_address+0xac/0x170 [ 539.685535][T20491] ? find_held_lock+0x35/0x130 [ 539.700504][T20491] ? is_bpf_text_address+0xac/0x170 19:24:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 539.705725][T20491] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 539.711641][T20491] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 539.718092][T20491] ? __lockdep_free_key_range+0x120/0x120 [ 539.723824][T20491] inet_sendmsg+0x147/0x5d0 [ 539.723841][T20491] ? rawv6_getsockopt+0x150/0x150 [ 539.723850][T20491] ? inet_sendmsg+0x147/0x5d0 [ 539.723861][T20491] ? ipip_gro_receive+0x100/0x100 [ 539.723878][T20491] sock_sendmsg+0xdd/0x130 [ 539.723894][T20491] sock_write_iter+0x27c/0x3e0 [ 539.723911][T20491] ? sock_sendmsg+0x130/0x130 [ 539.747593][T20491] ? __fget+0x35a/0x550 [ 539.747612][T20491] ? find_held_lock+0x35/0x130 [ 539.747635][T20491] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.772191][T20491] ? iov_iter_init+0xee/0x220 [ 539.776889][T20491] new_sync_write+0x4c7/0x760 [ 539.781597][T20491] ? default_llseek+0x2e0/0x2e0 [ 539.786466][T20491] ? __fget+0x381/0x550 [ 539.786490][T20491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.786511][T20491] ? security_file_permission+0x94/0x380 [ 539.802516][T20491] __vfs_write+0xe4/0x110 [ 539.806870][T20491] vfs_write+0x20c/0x580 [ 539.811134][T20491] ksys_write+0xea/0x1f0 [ 539.815385][T20491] ? __ia32_sys_read+0xb0/0xb0 [ 539.815405][T20491] ? do_syscall_64+0x26/0x610 [ 539.815419][T20491] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.815437][T20491] ? do_syscall_64+0x26/0x610 [ 539.835578][T20491] __x64_sys_write+0x73/0xb0 [ 539.840202][T20491] do_syscall_64+0x103/0x610 [ 539.844813][T20491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.850712][T20491] RIP: 0033:0x458209 [ 539.854618][T20491] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.874401][T20491] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 539.882826][T20491] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 539.890812][T20491] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 539.898896][T20491] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 539.906888][T20491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 539.914889][T20491] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 539.966518][T20495] XFS (loop3): Invalid superblock magic number 19:24:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xff0f, 0x0, 0x0, 0x0, 0x0) 19:24:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:24:58 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)=0x15e) socket$inet_smc(0x2b, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x280001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) 19:24:58 executing program 2 (fault-call:3 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 540.258789][T20528] FAULT_INJECTION: forcing a failure. [ 540.258789][T20528] name failslab, interval 1, probability 0, space 0, times 0 [ 540.322328][T20528] CPU: 1 PID: 20528 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 540.330360][T20528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.340441][T20528] Call Trace: [ 540.343761][T20528] dump_stack+0x172/0x1f0 [ 540.348177][T20528] should_fail.cold+0xa/0x15 [ 540.352774][T20528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 540.358584][T20528] ? ___might_sleep+0x163/0x280 [ 540.363467][T20528] __should_failslab+0x121/0x190 [ 540.368435][T20528] should_failslab+0x9/0x14 [ 540.368454][T20528] kmem_cache_alloc_node+0x264/0x710 [ 540.368470][T20528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.368493][T20528] __alloc_skb+0xd5/0x5e0 [ 540.378258][T20528] ? skb_trim+0x190/0x190 [ 540.378279][T20528] ? __alloc_skb+0x6/0x5e0 [ 540.378301][T20528] __ip6_append_data.isra.0+0x29ed/0x3600 [ 540.378323][T20528] ? rawv6_mh_filter_unregister+0x20/0x20 [ 540.408337][T20528] ? dst_output+0x180/0x180 [ 540.412863][T20528] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 540.418430][T20528] ip6_append_data+0x1e5/0x320 [ 540.423209][T20528] ? rawv6_mh_filter_unregister+0x20/0x20 [ 540.428939][T20528] ? rawv6_mh_filter_unregister+0x20/0x20 [ 540.434755][T20528] rawv6_sendmsg+0x1467/0x35e0 [ 540.437006][T20533] XFS (loop1): Invalid superblock magic number [ 540.441177][T20528] ? rawv6_getsockopt+0x150/0x150 [ 540.441206][T20528] ? is_bpf_text_address+0xac/0x170 [ 540.441221][T20528] ? find_held_lock+0x35/0x130 [ 540.441235][T20528] ? is_bpf_text_address+0xac/0x170 [ 540.441257][T20528] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 540.473474][T20528] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 540.479892][T20528] ? __lockdep_free_key_range+0x120/0x120 [ 540.485598][T20528] inet_sendmsg+0x147/0x5d0 [ 540.490087][T20528] ? rawv6_getsockopt+0x150/0x150 [ 540.495093][T20528] ? inet_sendmsg+0x147/0x5d0 [ 540.499802][T20528] ? ipip_gro_receive+0x100/0x100 [ 540.504823][T20528] sock_sendmsg+0xdd/0x130 [ 540.509235][T20528] sock_write_iter+0x27c/0x3e0 [ 540.513993][T20528] ? sock_sendmsg+0x130/0x130 [ 540.518663][T20528] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 540.524886][T20528] ? iov_iter_init+0xee/0x220 [ 540.529565][T20528] new_sync_write+0x4c7/0x760 [ 540.534228][T20528] ? default_llseek+0x2e0/0x2e0 [ 540.539062][T20528] ? __fget+0x381/0x550 [ 540.543292][T20528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.549519][T20528] ? security_file_permission+0x94/0x380 [ 540.555174][T20528] __vfs_write+0xe4/0x110 [ 540.559499][T20528] vfs_write+0x20c/0x580 [ 540.563726][T20528] ksys_write+0xea/0x1f0 [ 540.567958][T20528] ? __ia32_sys_read+0xb0/0xb0 [ 540.572704][T20528] ? do_syscall_64+0x26/0x610 [ 540.577369][T20528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.583418][T20528] ? do_syscall_64+0x26/0x610 [ 540.588083][T20528] __x64_sys_write+0x73/0xb0 [ 540.592659][T20528] do_syscall_64+0x103/0x610 [ 540.597255][T20528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.603141][T20528] RIP: 0033:0x458209 [ 540.607036][T20528] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.626631][T20528] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 540.635033][T20528] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 540.642993][T20528] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 540.651057][T20528] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 540.659017][T20528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 540.666981][T20528] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:24:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:24:58 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:24:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:24:58 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r2, 0x5, 0xff}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'ghash\x00'}}, &(0x7f0000000300)="b5557613fb859f44ffd8a7c4c9f8de19dbf6a306655f23718cda85fa4ebfc87917d7be7118d4fa2c84eba5e940998f4479f0ae45ee9c1d58ff475961f40869b6fa326bd7833c6b388c3e8808a8e4c1fe7f0f2a9d7f155afca592deb959dd9ebf76b69bb1fa47b006826b12dc8c2cd60db73d", &(0x7f0000000380)=""/212) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffb}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) 19:24:58 executing program 2 (fault-call:3 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 540.798340][T20554] FAULT_INJECTION: forcing a failure. [ 540.798340][T20554] name failslab, interval 1, probability 0, space 0, times 0 [ 540.837605][T20554] CPU: 0 PID: 20554 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 540.845631][T20554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.855708][T20554] Call Trace: [ 540.859032][T20554] dump_stack+0x172/0x1f0 [ 540.863389][T20554] should_fail.cold+0xa/0x15 [ 540.868007][T20554] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 540.873841][T20554] ? ___might_sleep+0x163/0x280 [ 540.878706][T20554] __should_failslab+0x121/0x190 [ 540.883659][T20554] should_failslab+0x9/0x14 [ 540.888255][T20554] kmem_cache_alloc_node_trace+0x270/0x720 [ 540.894085][T20554] __kmalloc_node_track_caller+0x3d/0x70 [ 540.899719][T20554] __kmalloc_reserve.isra.0+0x40/0xf0 [ 540.905093][T20554] __alloc_skb+0x10b/0x5e0 [ 540.909512][T20554] ? skb_trim+0x190/0x190 [ 540.913848][T20554] ? __ip6_append_data.isra.0+0x1dd6/0x3600 [ 540.919741][T20554] ? __ip6_append_data.isra.0+0x1e5d/0x3600 [ 540.925654][T20554] __ip6_append_data.isra.0+0x29ed/0x3600 [ 540.931390][T20554] ? rawv6_mh_filter_unregister+0x20/0x20 [ 540.937333][T20554] ? dst_output+0x180/0x180 [ 540.941845][T20554] ip6_append_data+0x1e5/0x320 19:24:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:24:59 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) socket$packet(0x11, 0x3, 0x300) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 540.946614][T20554] ? rawv6_mh_filter_unregister+0x20/0x20 [ 540.952426][T20554] ? rawv6_mh_filter_unregister+0x20/0x20 [ 540.958243][T20554] rawv6_sendmsg+0x1467/0x35e0 [ 540.963025][T20554] ? rawv6_getsockopt+0x150/0x150 [ 540.968077][T20554] ? is_bpf_text_address+0xac/0x170 [ 540.973300][T20554] ? find_held_lock+0x35/0x130 [ 540.978082][T20554] ? is_bpf_text_address+0xac/0x170 [ 540.986804][T20554] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 540.992724][T20554] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 540.992752][T20554] ? __lockdep_free_key_range+0x120/0x120 [ 541.005065][T20554] inet_sendmsg+0x147/0x5d0 [ 541.009752][T20554] ? rawv6_getsockopt+0x150/0x150 [ 541.009767][T20554] ? inet_sendmsg+0x147/0x5d0 [ 541.009779][T20554] ? ipip_gro_receive+0x100/0x100 [ 541.009799][T20554] sock_sendmsg+0xdd/0x130 [ 541.028936][T20554] sock_write_iter+0x27c/0x3e0 [ 541.028955][T20554] ? sock_sendmsg+0x130/0x130 [ 541.028977][T20554] ? __fget+0x35a/0x550 [ 541.042558][T20554] ? find_held_lock+0x35/0x130 [ 541.047333][T20554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.047350][T20554] ? iov_iter_init+0xee/0x220 [ 541.047371][T20554] new_sync_write+0x4c7/0x760 [ 541.062992][T20554] ? default_llseek+0x2e0/0x2e0 [ 541.067880][T20554] ? __fget+0x381/0x550 [ 541.072128][T20554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.078492][T20554] ? security_file_permission+0x94/0x380 [ 541.084150][T20554] __vfs_write+0xe4/0x110 [ 541.088505][T20554] vfs_write+0x20c/0x580 [ 541.092751][T20554] ksys_write+0xea/0x1f0 [ 541.092770][T20554] ? __ia32_sys_read+0xb0/0xb0 [ 541.092788][T20554] ? do_syscall_64+0x26/0x610 [ 541.092802][T20554] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.092813][T20554] ? do_syscall_64+0x26/0x610 [ 541.092831][T20554] __x64_sys_write+0x73/0xb0 [ 541.092845][T20554] do_syscall_64+0x103/0x610 [ 541.092860][T20554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.092872][T20554] RIP: 0033:0x458209 19:24:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) [ 541.092886][T20554] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.092893][T20554] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 541.092906][T20554] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 541.092928][T20554] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 541.183787][T20554] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 541.191862][T20554] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 541.199870][T20554] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 541.222230][T20561] XFS (loop3): Invalid superblock magic number [ 541.240273][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 541.246124][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 541.252019][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 541.257801][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 541.400258][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 541.406121][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:24:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x20000, 0x0, 0x0, 0x0, 0x0) 19:24:59 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x100, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) recvfrom$packet(r1, &(0x7f0000000040)=""/185, 0xb9, 0x2, &(0x7f0000000400)={0x11, 0xf8, r2, 0x1, 0x7f}, 0x14) 19:24:59 executing program 2 (fault-call:3 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:24:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) [ 541.608629][T20591] FAULT_INJECTION: forcing a failure. [ 541.608629][T20591] name failslab, interval 1, probability 0, space 0, times 0 [ 541.691694][T20591] CPU: 1 PID: 20591 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 541.699715][T20591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.699723][T20591] Call Trace: [ 541.699747][T20591] dump_stack+0x172/0x1f0 [ 541.699769][T20591] should_fail.cold+0xa/0x15 [ 541.721993][T20591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 541.727794][T20591] ? perf_trace_lock+0xeb/0x510 [ 541.727810][T20591] ? mark_held_locks+0xa4/0xf0 [ 541.727833][T20591] __should_failslab+0x121/0x190 [ 541.727853][T20591] should_failslab+0x9/0x14 [ 541.746900][T20591] kmem_cache_alloc_node+0x56/0x710 [ 541.752121][T20591] __alloc_skb+0xd5/0x5e0 [ 541.756547][T20591] ? skb_trim+0x190/0x190 [ 541.760885][T20591] ? kasan_check_read+0x11/0x20 [ 541.765744][T20591] ip6_fragment+0x14ef/0x3760 [ 541.770427][T20591] ? ip6_forward_finish+0x580/0x580 [ 541.775642][T20591] ? ip6_forward+0x3880/0x3880 [ 541.780410][T20591] ? kasan_check_read+0x11/0x20 [ 541.785361][T20591] ip6_finish_output+0x6aa/0xc30 [ 541.790830][T20591] ip6_output+0x235/0x7f0 [ 541.795179][T20591] ? ip6_finish_output+0xc30/0xc30 [ 541.800294][T20591] ? ip6_fragment+0x3760/0x3760 [ 541.805248][T20591] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 541.810890][T20591] ip6_local_out+0xc4/0x1b0 [ 541.810912][T20591] ip6_send_skb+0xbb/0x350 [ 541.819817][T20591] ip6_push_pending_frames+0xc8/0xf0 [ 541.825129][T20591] rawv6_sendmsg+0x299c/0x35e0 [ 541.830002][T20591] ? rawv6_getsockopt+0x150/0x150 [ 541.835047][T20591] ? is_bpf_text_address+0xac/0x170 [ 541.840249][T20591] ? find_held_lock+0x35/0x130 [ 541.840268][T20591] ? is_bpf_text_address+0xac/0x170 [ 541.840290][T20591] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 541.840307][T20591] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 541.840332][T20591] ? __lockdep_free_key_range+0x120/0x120 [ 541.868503][T20591] inet_sendmsg+0x147/0x5d0 [ 541.873030][T20591] ? rawv6_getsockopt+0x150/0x150 [ 541.878067][T20591] ? inet_sendmsg+0x147/0x5d0 [ 541.882759][T20591] ? ipip_gro_receive+0x100/0x100 [ 541.887793][T20591] sock_sendmsg+0xdd/0x130 [ 541.892224][T20591] sock_write_iter+0x27c/0x3e0 [ 541.897008][T20591] ? sock_sendmsg+0x130/0x130 [ 541.901796][T20591] ? __fget+0x35a/0x550 [ 541.905990][T20591] ? find_held_lock+0x35/0x130 [ 541.910759][T20591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.917012][T20591] ? iov_iter_init+0xee/0x220 [ 541.921694][T20591] new_sync_write+0x4c7/0x760 [ 541.926374][T20591] ? default_llseek+0x2e0/0x2e0 [ 541.931249][T20591] ? __fget+0x381/0x550 [ 541.935433][T20591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.941688][T20591] ? security_file_permission+0x94/0x380 [ 541.947340][T20591] __vfs_write+0xe4/0x110 [ 541.951694][T20591] vfs_write+0x20c/0x580 [ 541.955959][T20591] ksys_write+0xea/0x1f0 [ 541.960217][T20591] ? __ia32_sys_read+0xb0/0xb0 [ 541.964992][T20591] ? do_syscall_64+0x26/0x610 [ 541.969678][T20591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.975765][T20591] ? do_syscall_64+0x26/0x610 [ 541.980468][T20591] __x64_sys_write+0x73/0xb0 [ 541.985088][T20591] do_syscall_64+0x103/0x610 [ 541.989697][T20591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.995603][T20591] RIP: 0033:0x458209 [ 541.999514][T20591] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 542.019217][T20591] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 542.027671][T20591] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 19:25:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0xfff, 0xb774, 0x77, 0x7, 0x54}, 0x14) 19:25:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:25:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x80000000080004, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x101002, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000080)) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)=0x16e) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000240)=""/134, 0x2}) 19:25:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x200, 0x180) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x40, r1, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8010}, 0x4004080) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r3 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x0, 0x101000) r4 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x400) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) inotify_rm_watch(r3, r4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r5, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x62}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x2d4, r6, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7, @remote, 0x7fff}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0x134, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x64d5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb87}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa363}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc23}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fa8428e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb150}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5892a7b8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12df}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x2d4}}, 0x8080) [ 542.035747][T20591] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 542.043736][T20591] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 542.051718][T20591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 542.059733][T20591] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 [ 542.120491][T20600] XFS (loop1): Invalid superblock magic number 19:25:00 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x6, 0x8000) accept4$ax25(r2, &(0x7f0000000680)={{0x3, @rose}, [@rose, @default, @default, @bcast, @rose, @rose, @netrom, @null]}, &(0x7f00000005c0)=0x48, 0x80800) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpeername$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0xffffffffffffff43) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 542.178236][T20608] XFS (loop3): Invalid superblock magic number 19:25:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x40000, 0x0, 0x0, 0x0, 0x0) 19:25:00 executing program 2 (fault-call:3 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80080, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000040)) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000080)=0x7fff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 19:25:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 542.575221][T20652] FAULT_INJECTION: forcing a failure. [ 542.575221][T20652] name failslab, interval 1, probability 0, space 0, times 0 [ 542.630555][T20652] CPU: 0 PID: 20652 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 542.638581][T20652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.648637][T20652] Call Trace: [ 542.648667][T20652] dump_stack+0x172/0x1f0 [ 542.648698][T20652] should_fail.cold+0xa/0x15 [ 542.660884][T20652] ? skb_copy_bits+0x4b0/0x760 [ 542.665658][T20652] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 542.665676][T20652] ? save_stack+0x45/0xd0 [ 542.665696][T20652] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 542.681634][T20652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.687898][T20652] ? should_fail+0x1de/0x852 [ 542.692517][T20652] __should_failslab+0x121/0x190 [ 542.697554][T20652] should_failslab+0x9/0x14 [ 542.702061][T20652] kmem_cache_alloc_node_trace+0x5a/0x720 [ 542.707806][T20652] __kmalloc_node_track_caller+0x3d/0x70 [ 542.713451][T20652] __kmalloc_reserve.isra.0+0x40/0xf0 [ 542.718835][T20652] __alloc_skb+0x10b/0x5e0 [ 542.723262][T20652] ? skb_trim+0x190/0x190 [ 542.727595][T20652] ? kasan_check_read+0x11/0x20 [ 542.732471][T20652] ip6_fragment+0x14ef/0x3760 [ 542.737161][T20652] ? ip6_forward_finish+0x580/0x580 [ 542.742376][T20652] ? ip6_forward+0x3880/0x3880 [ 542.747137][T20652] ? kasan_check_read+0x11/0x20 [ 542.752177][T20652] ip6_finish_output+0x6aa/0xc30 [ 542.757127][T20652] ip6_output+0x235/0x7f0 [ 542.761463][T20652] ? ip6_finish_output+0xc30/0xc30 [ 542.766576][T20652] ? ip6_fragment+0x3760/0x3760 [ 542.771434][T20652] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 542.776991][T20652] ip6_local_out+0xc4/0x1b0 [ 542.781503][T20652] ip6_send_skb+0xbb/0x350 [ 542.785925][T20652] ip6_push_pending_frames+0xc8/0xf0 [ 542.791219][T20652] rawv6_sendmsg+0x299c/0x35e0 [ 542.795993][T20652] ? rawv6_getsockopt+0x150/0x150 [ 542.801033][T20652] ? is_bpf_text_address+0xac/0x170 [ 542.806232][T20652] ? find_held_lock+0x35/0x130 [ 542.811006][T20652] ? is_bpf_text_address+0xac/0x170 [ 542.816224][T20652] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 542.822217][T20652] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 542.828673][T20652] ? __lockdep_free_key_range+0x120/0x120 [ 542.834408][T20652] inet_sendmsg+0x147/0x5d0 [ 542.839272][T20652] ? rawv6_getsockopt+0x150/0x150 [ 542.844304][T20652] ? inet_sendmsg+0x147/0x5d0 [ 542.844320][T20652] ? ipip_gro_receive+0x100/0x100 [ 542.844339][T20652] sock_sendmsg+0xdd/0x130 [ 542.844357][T20652] sock_write_iter+0x27c/0x3e0 [ 542.844372][T20652] ? sock_sendmsg+0x130/0x130 [ 542.844394][T20652] ? __fget+0x35a/0x550 [ 542.858583][T20652] ? find_held_lock+0x35/0x130 [ 542.876927][T20652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 542.883184][T20652] ? iov_iter_init+0xee/0x220 [ 542.883204][T20652] new_sync_write+0x4c7/0x760 [ 542.883224][T20652] ? default_llseek+0x2e0/0x2e0 [ 542.883244][T20652] ? __fget+0x381/0x550 [ 542.883262][T20652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.883278][T20652] ? security_file_permission+0x94/0x380 [ 542.883293][T20652] __vfs_write+0xe4/0x110 [ 542.883311][T20652] vfs_write+0x20c/0x580 [ 542.883330][T20652] ksys_write+0xea/0x1f0 [ 542.883352][T20652] ? __ia32_sys_read+0xb0/0xb0 [ 542.892685][T20652] ? do_syscall_64+0x26/0x610 [ 542.892702][T20652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.892719][T20652] ? do_syscall_64+0x26/0x610 [ 542.907933][T20652] __x64_sys_write+0x73/0xb0 [ 542.907954][T20652] do_syscall_64+0x103/0x610 [ 542.907974][T20652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.907990][T20652] RIP: 0033:0x458209 [ 542.922159][T20652] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 542.922168][T20652] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 542.922184][T20652] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 542.922193][T20652] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 542.922199][T20652] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 19:25:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:01 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfd}, 0xc) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:01 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000680)=""/227, 0xe3) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xfffffffffffffffc, 0x80) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000400)={0x0, 0x7, "5e73c24b67dc8a919a031129cb424c9cfead41e42c80747e", {0x75ce, 0x9}, 0x7}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000780)=""/169) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x180, 0x9) semget(0x2, 0x2, 0x280) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000580)={'yam0\x00', 0x2}) [ 542.922206][T20652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 542.922213][T20652] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:25:01 executing program 2 (fault-call:3 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 543.158682][T20680] FAULT_INJECTION: forcing a failure. [ 543.158682][T20680] name failslab, interval 1, probability 0, space 0, times 0 [ 543.173114][T20680] CPU: 1 PID: 20680 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 543.181235][T20680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.191319][T20680] Call Trace: [ 543.194671][T20680] dump_stack+0x172/0x1f0 [ 543.199043][T20680] should_fail.cold+0xa/0x15 [ 543.203655][T20680] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 543.209569][T20680] ? save_stack+0xa9/0xd0 [ 543.213908][T20680] ? save_stack+0x45/0xd0 [ 543.218255][T20680] __should_failslab+0x121/0x190 [ 543.223215][T20680] should_failslab+0x9/0x14 [ 543.228540][T20680] __kmalloc+0x71/0x740 [ 543.232814][T20680] ? new_sync_write+0x4c7/0x760 [ 543.237780][T20680] ? __vfs_write+0xe4/0x110 [ 543.242292][T20680] ? vfs_write+0x20c/0x580 [ 543.247238][T20680] ? ksys_write+0xea/0x1f0 [ 543.251660][T20680] ? __x64_sys_write+0x73/0xb0 [ 543.256515][T20680] ? do_syscall_64+0x103/0x610 [ 543.261291][T20680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.267833][T20680] ? ___neigh_create+0x1087/0x2050 [ 543.272967][T20680] ___neigh_create+0x1087/0x2050 [ 543.278443][T20680] ? mark_held_locks+0xf0/0xf0 [ 543.283245][T20680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.289598][T20680] __neigh_create+0x2f/0x40 [ 543.294118][T20680] ip6_finish_output2+0x94a/0x2550 [ 543.299250][T20680] ? ip6_forward_finish+0x580/0x580 [ 543.304545][T20680] ? memcpy+0x46/0x50 [ 543.308532][T20680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.314779][T20680] ? skb_copy_bits+0x4b0/0x760 [ 543.319566][T20680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 543.325906][T20680] ip6_fragment+0x1380/0x3760 [ 543.331288][T20680] ? ip6_forward_finish+0x580/0x580 [ 543.336493][T20680] ? ip6_fragment+0x1380/0x3760 [ 543.341371][T20680] ? ip6_forward_finish+0x580/0x580 [ 543.346590][T20680] ? ip6_forward+0x3880/0x3880 [ 543.351452][T20680] ? kasan_check_read+0x11/0x20 [ 543.356417][T20680] ip6_finish_output+0x6aa/0xc30 [ 543.361533][T20680] ip6_output+0x235/0x7f0 [ 543.365891][T20680] ? ip6_finish_output+0xc30/0xc30 [ 543.371114][T20680] ? ip6_fragment+0x3760/0x3760 [ 543.376164][T20680] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 543.381738][T20680] ip6_local_out+0xc4/0x1b0 [ 543.386355][T20680] ip6_send_skb+0xbb/0x350 [ 543.390878][T20680] ip6_push_pending_frames+0xc8/0xf0 [ 543.396531][T20680] rawv6_sendmsg+0x299c/0x35e0 [ 543.402370][T20680] ? rawv6_getsockopt+0x150/0x150 [ 543.407682][T20680] ? is_bpf_text_address+0xac/0x170 [ 543.412943][T20680] ? find_held_lock+0x35/0x130 [ 543.417811][T20680] ? is_bpf_text_address+0xac/0x170 [ 543.423050][T20680] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 543.429055][T20680] ? tomoyo_socket_sendmsg_permission+0x147/0x3b8 [ 543.435682][T20680] ? __lockdep_free_key_range+0x120/0x120 [ 543.441599][T20680] inet_sendmsg+0x147/0x5d0 [ 543.446200][T20680] ? rawv6_getsockopt+0x150/0x150 [ 543.451254][T20680] ? inet_sendmsg+0x147/0x5d0 [ 543.455940][T20680] ? ipip_gro_receive+0x100/0x100 [ 543.461458][T20680] sock_sendmsg+0xdd/0x130 [ 543.466251][T20680] sock_write_iter+0x27c/0x3e0 [ 543.471926][T20680] ? sock_sendmsg+0x130/0x130 [ 543.476723][T20680] ? __fget+0x35a/0x550 [ 543.480927][T20680] ? find_held_lock+0x35/0x130 [ 543.485730][T20680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 543.492154][T20680] ? iov_iter_init+0xee/0x220 [ 543.496934][T20680] new_sync_write+0x4c7/0x760 [ 543.501622][T20680] ? default_llseek+0x2e0/0x2e0 [ 543.506584][T20680] ? __fget+0x381/0x550 [ 543.510761][T20680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.517025][T20680] ? security_file_permission+0x94/0x380 [ 543.522856][T20680] __vfs_write+0xe4/0x110 [ 543.527206][T20680] vfs_write+0x20c/0x580 [ 543.531461][T20680] ksys_write+0xea/0x1f0 [ 543.535826][T20680] ? __ia32_sys_read+0xb0/0xb0 [ 543.540598][T20680] ? do_syscall_64+0x26/0x610 [ 543.545287][T20680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.551365][T20680] ? do_syscall_64+0x26/0x610 [ 543.556055][T20680] __x64_sys_write+0x73/0xb0 [ 543.560658][T20680] do_syscall_64+0x103/0x610 [ 543.565719][T20680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.571620][T20680] RIP: 0033:0x458209 [ 543.575527][T20680] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 543.595232][T20680] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 543.603653][T20680] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 543.611629][T20680] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 543.619605][T20680] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 543.627581][T20680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 543.635561][T20680] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:25:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:01 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400101, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x201044}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000033b104ecba27ccc2bd996c2817fccb6839d1524bf8df1bd20abcde43ff63e1c5f63316209434720aeb08ab25ea72d3e289b959e242f04d2703e6e2f5a90feab991387ee14d26abba85341ba9d04584e0733d8dde2fadc8ed5809a6c61250a3d2e7b67e3b4ff11c9b5a7dd53accca870accbf0b95d99802604c549851607ae7801b82f19ffdd30ace6f2ab3714ed3cf21923ec3606b43ec0e1106348e2faaae61791f92", @ANYRES16=r2, @ANYBLOB="10002cbd7000fcdbdf250500000008000600ffffff7f"], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x4000) [ 543.764763][T20685] XFS (loop3): Invalid superblock magic number 19:25:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xe0000, 0x0, 0x0, 0x0, 0x0) 19:25:02 executing program 2 (fault-call:3 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:02 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet6(0xa, 0x4, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window={0x3, 0x3, 0x99}, @mss={0x2, 0xfffffffffffffffd}, @timestamp, @timestamp, @window={0x3, 0x0, 0x1}, @sack_perm], 0x7) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 544.092893][T20723] FAULT_INJECTION: forcing a failure. [ 544.092893][T20723] name failslab, interval 1, probability 0, space 0, times 0 [ 544.106337][T20723] CPU: 0 PID: 20723 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 544.114357][T20723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.124425][T20723] Call Trace: [ 544.127761][T20723] dump_stack+0x172/0x1f0 [ 544.132122][T20723] should_fail.cold+0xa/0x15 [ 544.136754][T20723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 544.142588][T20723] ? mark_held_locks+0xa4/0xf0 [ 544.147379][T20723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.152857][T20723] __should_failslab+0x121/0x190 [ 544.158078][T20723] should_failslab+0x9/0x14 [ 544.162600][T20723] kmem_cache_alloc_node+0x56/0x710 [ 544.167899][T20723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.173520][T20723] __alloc_skb+0xd5/0x5e0 [ 544.177881][T20723] ? skb_trim+0x190/0x190 [ 544.182221][T20723] ? perf_trace_lock+0xeb/0x510 [ 544.187210][T20723] ? fib6_rule_lookup+0x166/0x560 [ 544.192272][T20723] alloc_skb_with_frags+0x93/0x580 [ 544.196180][T20724] XFS (loop1): Invalid superblock magic number [ 544.197395][T20723] ? ip6_dst_lookup_tail+0xa8a/0x1b30 [ 544.209268][T20723] ? find_held_lock+0x35/0x130 [ 544.214478][T20723] sock_alloc_send_pskb+0x72d/0x8a0 [ 544.219714][T20723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.225986][T20723] ? sock_wmalloc+0x120/0x120 [ 544.230695][T20723] ? mark_held_locks+0xa4/0xf0 [ 544.235479][T20723] ? __lockdep_free_key_range+0x120/0x120 [ 544.241235][T20723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.246715][T20723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.252378][T20723] ? lockdep_hardirqs_on+0x19e/0x5d0 [ 544.257942][T20723] ? retint_kernel+0x2d/0x2d [ 544.262546][T20723] ? trace_hardirqs_on_caller+0x6a/0x220 [ 544.268196][T20723] sock_alloc_send_skb+0x32/0x40 [ 544.273225][T20723] __ip6_append_data.isra.0+0x214c/0x3600 [ 544.278942][T20723] ? rawv6_exit+0x20/0x20 [ 544.283360][T20723] ? dst_output+0x180/0x180 [ 544.287854][T20723] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 544.293484][T20723] ip6_append_data+0x1e5/0x320 [ 544.298240][T20723] ? rawv6_exit+0x20/0x20 [ 544.302573][T20723] ? rawv6_exit+0x20/0x20 [ 544.307148][T20723] icmp6_send+0x1753/0x21f0 [ 544.311666][T20723] ? perf_trace_lock+0xeb/0x510 [ 544.316534][T20723] ? icmpv6_push_pending_frames+0x540/0x540 [ 544.322427][T20723] ? check_prev_add.constprop.0+0x1580/0x23c0 [ 544.328522][T20723] ? mark_held_locks+0xf0/0xf0 [ 544.333298][T20723] ? icmpv6_push_pending_frames+0x540/0x540 [ 544.339178][T20723] icmpv6_send+0xee/0x230 [ 544.343679][T20723] ? icmpv6_push_pending_frames+0x540/0x540 [ 544.349556][T20723] ? icmpv6_send+0xee/0x230 [ 544.354061][T20723] ip6_link_failure+0x2b/0x530 [ 544.358825][T20723] ? rt6_do_update_pmtu+0x620/0x620 [ 544.364022][T20723] ip6_tnl_xmit+0x447/0x3500 [ 544.368622][T20723] ? unwind_get_return_address+0x61/0xa0 [ 544.374282][T20723] ? ip6ip6_err+0x540/0x540 [ 544.378780][T20723] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 544.384489][T20723] ? map_id_range_down+0x1ee/0x370 [ 544.389604][T20723] ? __put_user_ns+0x70/0x70 [ 544.394452][T20723] ? ipv6_ext_hdr+0x7e/0x90 [ 544.399124][T20723] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 544.405361][T20723] ? ip6_tnl_parse_tlv_enc_lim+0x349/0x5e0 [ 544.411190][T20723] ip6_tnl_start_xmit+0x867/0x1ce0 [ 544.416402][T20723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 544.422651][T20723] ? ip6_tnl_start_xmit+0x867/0x1ce0 [ 544.427934][T20723] ? ip6_tnl_xmit+0x3500/0x3500 [ 544.432836][T20723] dev_hard_start_xmit+0x1b2/0x980 [ 544.437955][T20723] __dev_queue_xmit+0x271d/0x3060 [ 544.443052][T20723] ? __local_bh_enable_ip+0x15a/0x270 [ 544.448839][T20723] ? lockdep_hardirqs_on+0x19e/0x5d0 [ 544.454146][T20723] ? ___neigh_create+0x130a/0x2050 [ 544.459261][T20723] ? netdev_pick_tx+0x300/0x300 [ 544.464106][T20723] ? _raw_read_unlock+0x40/0x50 [ 544.468954][T20723] ? ___neigh_create+0xb38/0x2050 [ 544.473983][T20723] ? retint_kernel+0x2d/0x2d [ 544.478581][T20723] dev_queue_xmit+0x18/0x20 [ 544.483067][T20723] ? dev_queue_xmit+0x18/0x20 [ 544.487825][T20723] neigh_direct_output+0x16/0x20 [ 544.492759][T20723] ip6_finish_output2+0xb7c/0x2550 [ 544.497862][T20723] ? skb_copy_bits+0x655/0x760 [ 544.502649][T20723] ? ip6_forward_finish+0x580/0x580 [ 544.507866][T20723] ? memcpy+0x46/0x50 [ 544.511849][T20723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.518609][T20723] ? skb_copy_bits+0x4b0/0x760 [ 544.523373][T20723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 544.529614][T20723] ip6_fragment+0x1380/0x3760 [ 544.534294][T20723] ? ip6_forward_finish+0x580/0x580 [ 544.539585][T20723] ? ip6_fragment+0x1380/0x3760 [ 544.544449][T20723] ? ip6_forward_finish+0x580/0x580 [ 544.549681][T20723] ? ip6_forward+0x3880/0x3880 [ 544.554487][T20723] ? kasan_check_read+0x11/0x20 [ 544.559336][T20723] ip6_finish_output+0x6aa/0xc30 [ 544.564279][T20723] ip6_output+0x235/0x7f0 [ 544.568603][T20723] ? ip6_finish_output+0xc30/0xc30 [ 544.573722][T20723] ? ip6_fragment+0x3760/0x3760 [ 544.578585][T20723] ip6_local_out+0xc4/0x1b0 [ 544.583096][T20723] ip6_send_skb+0xbb/0x350 [ 544.587502][T20723] ip6_push_pending_frames+0xc8/0xf0 [ 544.592799][T20723] rawv6_sendmsg+0x299c/0x35e0 [ 544.597648][T20723] ? pit_hpet_ptimer_calibrate_cpu+0x2bc/0x4e0 [ 544.603799][T20723] ? rawv6_getsockopt+0x150/0x150 [ 544.608811][T20723] ? perf_swevent_start_hrtimer.part.0+0xc0/0x130 [ 544.615226][T20723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.621472][T20723] ? debug_smp_processor_id+0x3c/0x280 [ 544.626950][T20723] ? event_sched_in.isra.0+0x5e8/0xbf0 [ 544.632505][T20723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.638263][T20723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.643881][T20723] ? lockdep_hardirqs_on+0x418/0x5d0 [ 544.658411][T20723] ? retint_kernel+0x2d/0x2d [ 544.663289][T20723] ? trace_hardirqs_on_caller+0x6a/0x220 [ 544.668940][T20723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.674437][T20723] ? rawv6_getsockopt+0x150/0x150 [ 544.679473][T20723] inet_sendmsg+0x147/0x5d0 [ 544.683994][T20723] ? rawv6_getsockopt+0x150/0x150 [ 544.689029][T20723] ? inet_sendmsg+0x147/0x5d0 [ 544.693785][T20723] ? ipip_gro_receive+0x100/0x100 [ 544.698799][T20723] sock_sendmsg+0xdd/0x130 [ 544.703212][T20723] sock_write_iter+0x27c/0x3e0 [ 544.707965][T20723] ? sock_sendmsg+0x130/0x130 [ 544.712660][T20723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 544.718891][T20723] ? iov_iter_init+0xee/0x220 [ 544.723555][T20723] new_sync_write+0x4c7/0x760 [ 544.728232][T20723] ? default_llseek+0x2e0/0x2e0 [ 544.733081][T20723] ? __fget+0x381/0x550 [ 544.737254][T20723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.743499][T20723] ? security_file_permission+0x94/0x380 [ 544.749159][T20723] __vfs_write+0xe4/0x110 [ 544.753526][T20723] vfs_write+0x20c/0x580 [ 544.757776][T20723] ksys_write+0xea/0x1f0 [ 544.762025][T20723] ? __ia32_sys_read+0xb0/0xb0 [ 544.766792][T20723] ? do_syscall_64+0x26/0x610 [ 544.771463][T20723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.777798][T20723] ? do_syscall_64+0x26/0x610 [ 544.782489][T20723] __x64_sys_write+0x73/0xb0 [ 544.787088][T20723] do_syscall_64+0x103/0x610 [ 544.791685][T20723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.797682][T20723] RIP: 0033:0x458209 [ 544.801578][T20723] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 544.821198][T20723] RSP: 002b:00007f1c60524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 544.829777][T20723] RAX: ffffffffffffffda RBX: 00007f1c60524c90 RCX: 0000000000458209 [ 544.837738][T20723] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 544.845699][T20723] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 544.853754][T20723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c605256d4 [ 544.861716][T20723] R13: 00000000004c75d9 R14: 00000000004dd1b0 R15: 0000000000000005 19:25:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:03 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x2000, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)={0x16, 0x6f, 0x8, {0x1, [{0x4c, 0x1, 0x3}]}}, 0x16) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x3, 0x4, 0x103}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffb, 0x121000) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x1ebf01, 0x0) sendto$isdn(r2, &(0x7f0000000180)={0x7aa, 0x3, "933a88bb959570b309545e631db501ebe0c835646c54d209f7b5ad01d94513cbabd448aee3b166653cb506b172c1ce27eb5507fa06058ab50e79c907059125b405971a9092c8ccccf63fa1d7ce9025a901cc22d7e60e8ca4825e5c8f4034f0a51ceb6da47298f5b6c48babae986c27e7f7b1c5eec145c4837c587c1dcf59846f135b9fec5c10d1fb8b2c7022cd6896575a4d492533a9a21af4d9"}, 0xa2, 0xc0, &(0x7f0000000240)={0x22, 0x8, 0x80, 0x2}, 0x6) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) 19:25:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x989680, 0x0, 0x0, 0x0, 0x0) 19:25:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={',! ', './file0'}, 0x3138) [ 545.347445][T20757] XFS (loop3): Invalid superblock magic number 19:25:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:03 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x100, 0x0) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0xffffffffffffff83, 0x6d, 0x5}, 0x45b) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0xc000) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000040)={0x6e, @multicast2, 0x4e24, 0x0, 'ovf\x00', 0x2, 0x7f, 0x78}, 0x2c) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)={0x6}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000800}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r3, 0x300, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xdcc}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x20000010) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0xfffffffffffffd64) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000080)=0x3e40eb0e) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000480)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000000000000db0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118) 19:25:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) [ 545.585015][T20779] XFS (loop1): Invalid superblock magic number [ 546.059772][T20914] XFS (loop1): Invalid superblock magic number 19:25:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={';! ', './file0'}, 0x3138) 19:25:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000180)=0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x10000000}) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000001c0)={0x8, "0785d24bf2be818a596b50ead37ede11d22b0b63104786957639950ecef3113f", 0x1000, 0xff, 0x8, 0x4, 0x1}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000080)={0x0, {0x0, 0x7fffffff}}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000000c0)=0x226b9ab2) 19:25:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:04 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) dup2(r1, r2) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000001ac0)="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", 0x1000, 0x0) r4 = add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdfdb932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1027bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a7d8d9d44e6293e786ab2e6d28f236c138d8e5e9bc1ce6f3d04", 0xfffffffffffffddf, r3) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r0, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000340)={0x60c, 0x6, 0x1000, &(0x7f0000000ac0)="3467a977766e8d556dac9217dab7b90e6d764aa689771bcece5e81bdcbf70e7be6af3e8d41d40a99c9081bbea1a0ca18b05f805760541316d2e2889845dfc285d6b793bd8a7ec893021d734fedc87918a28f6b0e539c0373a076bb889ab7d34411183fb71a5b4a29ac83d8e6aa3a7f40b9d0c7aca9693f3f74513a209eddf7d01cab69794fd80ea5c280f6794fae33b817926055fe12b4365ad8e417efdefcc4b3f8b7e66b1dabdc135de380900a6b8f50b4c2469e04a27703634df8bbc8ef5dd46611d585295d0cfc0cda38a412f37f0c17916a9d16c820946a85ece3d5acb1bd33c4c0687d4250017faa68e6fd7bdf645cf465054229f6babba58fb7c9820f0b1384062cd80dbd357ede869ec2c6e3b26ffcd28ee01cd5b55c4e6d8118aee6c97ff692c6298cacffffcedac184fa7cab8990017d38933ac38a2ff1e507a80c26e53ae39deb56aaf718400b26b00e084c2c622d7a9dd297cadbc6734d874a0c74b2ffcddf737c7210539b7ca86d3433c77551d6e966774b44e9d640dc699b38f7d3d1fdff4bbed008ac37a455ba4f5ab4b6af9dadfdf3f226889cc7ca820fa3553b440252560c2784824109e836d3909f126c7a32d3fa366dae61f5aa5c4db72c4f61032bcb8517f56cb1a55a4d778b942cacb3c3a4dfc8455f4a3bf882b1df09d0c89cf13db45462c96645a152e598b1dcd1557325c72a1f309353bdbc36b8868f6b124395ead60bdf037851876804f176b2c372fa0519d0ad26abf1008e357259f3009fc977e84b364858a7f8e3423059a14422e20448baf4a3b55a666d7c6b346e145dfccfd6697532c73e824d8bf844309e69d93274e31a2601cdd4e2436ff6a3d99b08f33f445cf2a12b0695b882bf598844fb414bd191116773b7e91be3050292abf400405360a878e0a6824c97772a3152136191b291447d84174025124773391b7690f60f99d78a90449bb233c149979f55c9ac9e400adcc0bc7be4a8dfc987d57cfda6b946940b2f299c0688f3fb0b6c6b0afa682f8d5083511e9336fea6fc8cd14aa2493cd89aea2b3bc9716926c6aea5730e2c47e055239e16989169c33d731f01db8803b1235e294b876c49d60917e60ced3a58d7bf4141e43d6a034c38edd0060125aae5cbbde5809b4c03c3901768ea0b52d1232b2d53aaa175f51909c2653206c7645d8ab2d645d1d9609a735787f28a910f05ea90c092599e7c4b5c77779768f2c1a0c4c394b794b26cc832bab7dea99b92ca74bad9ed5f37785120b2d0a7414a9f6bd2eb6e3394a4730680cb3f2fc3cb82518e7f88b2a932d15bc71da8be59a9f39c6a2d93208d527574eed7ed0d5ad1d60d2512da500f65328e290a1cc8da0039bcb34af5f04259fab6b3ee4dc741908f867075cb6194da59f1fa562b3b12a6a0d4e20bd2acd24ae69b53f97fc3702ae504a31cf9ce9105b56c781dbbcdf8916e50c98cf62eb6aafde3f6106d556f89eaf95b7fabe078d6ce4d01d49dfd0259ebfe320cb8cc796a17b60fddcc984b6170e5dd4e6fc4896c149fb4cdccbc4cd4b816c47e12ec5b7e474a8d2f899052375ab81b46e98ecc614473dd09425efd6995885671f9c483d05140be567c906715186c92c552c92aeda56d68fb319f2ae0e4eb716c9e1b1eb9d9bd7302b6186236ee54c63959ea9fc91388637c9b169838fe4a9010cd13aaee626fc4a1501ca174cff56a3f10d69083f54e10f6ca2d52b7c377382ca893d3cfbfbad3244c67996b11a1306b3310d3485c8d62a8ee8e1ba139076716f817f80c048b430eb8bdeea3ea1e58fa4bf8bf19bd1fb7ca8975d30a027094e7b8ac01524e4d0ccee7676b389c4a118607dbd7967485b9720d140eb51df629851cb2696bd1daba6dde976631e63b81832a4c0378101342e1276fe188390bd009893936f393db4e5a41dae993b50e396295ab7dc44184bead31651856e97e16449270fb15374e8ac3162f98564154c99756362f861c892d8e5d7eb511fbe42a7845ee152db13684d0e63cf2fb031018c4163f9013d2e37fd934bde0c79379079c7f2bc3ff6386e0eb6f25a8a83de8da51a226b22739bfe63b38b80f621494b8fef7a488fd4c2809c7d473c9e4813831121907cb4c20df6ca3cc8db239d7e48c9e9ec8b5474fdc58a1d7b1599ef3c787f0c9a14aca67cca9eccc1166e23f554bec1ad84a348eabf6a5d7e447a91828826f37c81133e177572897c167a5f5509507764a35d14c2873063a4fa59e3c8e6bf4e6b08dc25dcc30e5a9f03d0706c946542ffc96e913640dc2a59899c78cdd28c9d81a3eec5f0bf80927396c58e47e9a30914b557ba837952b02a0ef034f45fdc2250a46ca63392227c11889835473618264cfa1463d2b67fa27a8df26f7d8329a3dce5a2acd6504508c3311ab11c88e2bb072bdd85e6012096986f53b7faec0f02b4b8c0872409022496d8e3d309459d31626f60467f81563cb9fce28cea7590bc721922e6ab4243a67ff53aed0f3a4cf2e37c0a40a94e123bc2ec4a18e9d1de6883e91c8cfb358f4b770ea57e883d754047390ad392c6df9096d8636d7a9945bc2ab5b40839ea2c1d2299c0a2051542a020b97d0eeb49ca48f312c784625bbc9174a92915faed0629456f0dfa5a4a5640cdfbd914ea1dae8a3979427255fc3924dee165408cb2e963778a29c3821c4e076da6d8d396bdadf71927109a3f604a20c69e1ca0161aaa34011560df978ca1a758e7618a41da601bf274a70bfd6f68bcf6747b25a800d8e6909311831c7e2bbd374c2ee061cc0452b76c7c6b94b2b23d62e37ff5c1c0d436f82dddeb995f353602761c356fd04a652e1c3cf92f92caf0a45ad128e958772e181b1c90cf9209efadd4f4465ef850a775afa57bee8b7bb0fbf4b9387896e16e19df5581a953a9d124c3df54faf9ec8195f18273fc3d57a7ab79bca6c2067a5b218d09bca90a88b004ba8a8698c6677349c0e1e4352636e32ce57b8af5b586832416a035dd3c35a91cc91e16db750a813edf4e4a62c946e0656a9245df78da6fa097ad37d714bde6a9823a500ff70067b7f21bbc5ba90fca8870d4e05919471a0d838665938fd7bec413b2ef27567e4f2e6af939b656db0cb0250d4e4d5034ff1fc2f503a062b268865515b166742b22703d1bdf55991bad6126021f9ff26e77f98ceab45547cbc6f2ca9df37f24810e35e852c23b757185ea7f2c4fd7825c5bfdc651843f37c917fac8cea3ef58fae1bc0a7a8a23e935d6d55071ca96a40113d89050c1f4d14682ecd97a9f49a93d79dd6d97407db8565e89e55b036dfd2e735a89d48bc9997eba070bb03c28284334580419e42239c70ad937a135d8dc6ce76884ade11e72292a6f372614d917e1596f6e2f8a07aba4c9823956094c6ab0819fd45dd687e8099e29604e350cbf097148040527d11cd0d8ac6d9a643a2c042301889420c19e593073f58fc02a13523a2cd517e8c140114c57ed29adcc3d7fc3ae3c5553740c97a9088939f75bfbda6e7852454affe9879159fba5a2645fe7a2aca9f09dfba39079443a0998dd4df977af0a171a14af6882651f6ab41e19589213a6b7ea5eed2cca6d4bf96e1a37ae4ed0a4d24ef397e4bf8c75ee66b4c84f8b74dd9d96f84fa67d12f430e3869af6b88054fbf574a71eb9766cdf3c601de03597ab4930afa2ee68c4a62abae3a8625c9f8782f42e849a2314e83499849f565b5f6494d9762c2964dfcd7e002e2983d2870df08c7c9a33251f187faebbba75fb28c4efd8edb17cc99d619e410338ec567312585a13df8fb507d607004b871a2afe41c0ae2259dce59326f4232aa19f5df3f36cd94708817615ff807575b0967650dd0ae524f6e93e1576040522d6bebea2fc76b81ccafcfd139adf1960366b8b06259a1c6fbdc03113844ba59964b79f94c8565c470b6e28ea292a52a21458070b257faa99ec5e2c96180e820a9c6886fd1cd07e3129e9dcef7a8a36be5f36be01d5b872b1a6007b14a22754eadfeabfb890bcf32013fd17932513c0d5e512e0356b19513d307e117414504e60e11c261dea6d84a62128c8d7e0e5f24d30046012e11bb22bf79c84ebd38c23e27f810265d9eec8c2ac030eb5518814a42f4d6c62d7dff56dc31d2ffe89b7b957f9244358c0155d81440006bee864fc3e31bc36d057ae21f3828996c0b8022f288ebb623f1835e2e7f954a61d346ccd0f878907e291e48b4b7022e0bd4c14598d570a05d480571290c9c07b676b8f507fe3584e92f0c2fea02659166d51cfdbc879a7a39f0b4d6b2930867caebde885d1ad97c92838e917fa903be22e69e94466045e74dc130e40faab38b619cfb5dacf7a5006b35270548ad8c2f2662961e63298bdaf104710a85c49475a66ba449ba4c2829759b92ea896c08d41519ccdf11ecf6cb1fa5c752df095c2d320eec87e57b9833fccd5d4bc61d2eb8614c15f0039eb8ee504e5300f5a10a728fada4a30ec220b05dff360e718792925f2e6351ebf9ae7cdb16ecd449c7c7c838cddc617c7382ecbeea1f0b4f06facd4acd9a34894a08e4bce534bdcb68db59e7f054186ce7eda0ac6d3f1bc1f015e34739b348ae6936a0005d32e61158e9532092cfac014035232dac45944c41d836ddcf5bc82896c39db60eb5ad6de2feb60ec64520b52d29495f55fb96fc50616199392e10327710b9bbc850220107c1651d1aeef6ef50c7aaf41e7083347e3e95e3c1dd4d8a17e2903033a1a9d1f77c5d68d3542c21c9e23c3c4ba6380562c7a5aeea26fee006c62275fa01565a404e9776a7bff601566c667d77a071f1a5ec258eb3f70c30ab030805c9d4405e65bafdaf09f081d6f60a980babd67e1b55a8bbbdb223f3510c6e1c3969ce680fb0580bc4b16b70b03c28b2d28cac00a850a8de097ed1c2708e35e4ca64c2696d6193884c592dbf088a900913cea1577c45302a1720b2934064f813fe4b59cb468220003860bafd8ba340fdce7e5c88c2432ae93bbb0d652c93846aaf2e021ea88d414325631f1eab435a31a231f1d4e6957c6ac18fe937a9a1e44d3be2b42a16929ac335df06ff09ab078ee2d91105d90336cc3adf6087cc60f025f3fa8f998fd085f40c9bb6e54bbf9ccbbf3c638bab3788e33385d010b3bb441b2df02258cb0ec992918d728419ba8358a5038c80ff5efe707e153c0556463eb928ae5baf1ca5314dc28910a303d6ac6f3d2cce1deeeb94e060452754ab62d1fc9d7db65b43afcb4e2761fbde3f7935e3b8cb5358d517846d2590917c5ca70848579adf8b0a047edbedf605b73e08c132b127b088879c1af4d5614a305ec078e05866cf96f886b8bfd7bcc4c05660145613345aca53d815802f9cb1a6f7391f1b13bb53a650890c62b6181c89d9af7f4255ce3a5125a25a8c11bf98a869b3271717d7efbc3cc1ef645a16a8561f964291ba7afd751a2b76e2fce828b4683f4c08ec14bf225ec257565e0a8c61c701831dd1398fdcdb680762c46763de7b0f5c53da75ead06eaaed97aa78a6863edd05a37028871ea92d7063cbbf9ea5fb29733e21f6258d87c1c31c8a6c0b2c561ef133d799318f2e5a3b140f9fd79abae666dca2ded5a0146b49fcb4b472491d8d9e0d4744b5bcbe0a5579394d60dbe5059baadeb922ad9823affb15e48792d3c80e86bff70cd131f62a0c8fe40236624110c6fc86680fed429acafec5e320276959838b2ee5ebeca1427572fbaf15cdc47d4dbfe29d697babe4da329b0c62e31fecf2a8c0bbfbf7f96816e088da8d180f934aa71738a8b3b82aa7e63f7f"}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:04 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) [ 546.296455][T20937] XFS (loop3): Invalid superblock magic number 19:25:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) 19:25:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)=0xffffffffffffffa9) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0xda, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="bf09aa2df15926489762", 0xa}], 0x10, &(0x7f0000000200)={[{@utf8no='utf8=0'}, {@iocharset={'iocharset', 0x3d, 'koi8-ru'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@shortname_lower='shortname=lower'}, {@rodir='rodir'}, {@rodir='rodir'}, {@shortname_win95='shortname=win95'}, {@shortname_mixed='shortname=mixed'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '*securityuservboxnet0locpuset'}}, {@euid_lt={'euid<', r1}}, {@audit='audit'}, {@dont_measure='dont_measure'}, {@hash='hash'}]}) 19:25:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:25:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'0x0, 0x8, 0x1f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000180)={r2, 0x8}, 0x8) 19:25:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'31^', './file0'}, 0x3138) 19:25:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$cont(0x1f, r1, 0x1, 0x9) 19:25:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, 0x0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, 0x0, r1}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 547.252115][T21199] XFS (loop3): Invalid superblock magic number 19:25:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 19:25:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3!\t', './file0'}, 0x3138) 19:25:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = open(&(0x7f0000000200)='./file0\x00', 0x400280, 0x28) connect$rose(r1, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @default}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:05 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) r3 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x8, 0x10000000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f00000006c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10010000}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x24, r4, 0x8d6d3b329c89b990, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x7}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x44) ioctl$sock_ax25_SIOCADDRT(r3, 0x890b, &(0x7f0000000800)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @null]}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) ioctl$VIDIOC_S_DV_TIMINGS(r5, 0xc0845657, &(0x7f0000000740)={0x0, @bt={0x7fff, 0x5, 0x0, 0x1, 0x66, 0x1, 0x10000, 0x6, 0x49, 0xef0, 0x4, 0x3, 0x8, 0x5, 0x471a6a537fd6bb84, 0x1d}}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f0000000340)) 19:25:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:05 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x82400) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/193, 0xc1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) [ 547.571305][T21362] XFS (loop1): Invalid superblock magic number 19:25:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3!v', './file0'}, 0x3138) 19:25:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:25:06 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 19:25:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 548.043301][T21511] XFS (loop3): Invalid superblock magic number 19:25:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) 19:25:06 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/167, &(0x7f0000000100)=0xfffffffffffffdec) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x4, 0x0, &(0x7f0000000140)=0x33d) 19:25:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3!1', './file0'}, 0x3138) 19:25:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:06 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe89) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x2000000007c, 0x9, 0x8, 'queue0\x00', 0x9}) 19:25:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:06 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket(0x9, 0xf, 0x100000000) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000001200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000011c0)={&(0x7f00000000c0)={0x44, r2, 0x33c, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0xfffffffffffffffe]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x10000}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x40}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) open_by_handle_at(r0, &(0x7f0000000180)={0x1008, 0x81, "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"}, 0x100) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) [ 548.663588][T21617] XFS (loop1): Invalid superblock magic number 19:25:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0', [], 0x2}, 0x3138) 19:25:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:07 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) [ 548.977397][T21761] XFS (loop3): Invalid superblock magic number 19:25:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 19:25:07 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x48, 0x210000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x3) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) r4 = fcntl$getown(r0, 0x9) ptrace$peekuser(0x3, r4, 0xffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r3, 0xffff, 0xfff}, &(0x7f0000000100)=0xc) 19:25:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:25:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0', [], 0x3}, 0x3138) 19:25:07 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) modify_ldt$write2(0x11, &(0x7f0000000340)={0x9, 0x100000, 0x1000, 0x0, 0x8, 0x100000000, 0xffffffff80000001, 0x4, 0x7, 0x7}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:07 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10001, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimensat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {r3, r4/1000+30000}}, 0x100) accept(r1, &(0x7f0000000000)=@ax25={{0x3, @rose}, [@default, @bcast, @null, @bcast, @netrom, @bcast, @netrom, @null]}, &(0x7f0000000080)=0x80) 19:25:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0', [], 0x9}, 0x3138) [ 549.514342][T21893] XFS (loop1): Invalid superblock magic number 19:25:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x23, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:07 executing program 0: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) [ 549.969829][T22127] XFS (loop3): Invalid superblock magic number [ 550.027669][T22140] XFS (loop1): Invalid superblock magic number 19:25:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 19:25:08 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000000c0)={r1}) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0xd, "36ffa8c375de619b44a861"}, 0xd, 0x2) ioctl$TIOCCONS(r1, 0x541d) 19:25:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0', [], 0x5e31}, 0x3138) 19:25:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:08 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x46b) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 550.478017][T22152] XFS (loop3): Invalid superblock magic number 19:25:08 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200200, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x100, 0x0, 0x8000, 0x9, 0x58000000, 0x1f, 0x20, 0x7, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0x4, 0x10}, &(0x7f0000000180)=0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0', [], 0xfffffffd}, 0x3138) 19:25:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:25:08 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x181400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="0f350feaab009066f2d8a474ff0ff5fbbaf80c66b8d444ac8866efbafc0c66b80e00000066ef0f2369660f3830bd1090bad104b80700efd9e166b9800000c00f326635000100000f30", 0x49}], 0x1, 0x54, &(0x7f0000000180)=[@cr0={0x0, 0x1}, @flags={0x3, 0x28800}], 0x2) [ 550.703752][T22274] XFS (loop1): Invalid superblock magic number [ 550.847393][T22312] Unknown ioctl -2126991741 [ 550.873695][T22354] Unknown ioctl -2126991741 19:25:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x34, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x578) [ 551.210082][T22460] XFS (loop3): Invalid superblock magic number 19:25:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) 19:25:09 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x240000, 0x0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000040)=0x3) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x584) 19:25:09 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000680)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) r4 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x54000) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000780)=ANY=[@ANYBLOB="6a0600000000000003000000000000000400000000000000", @ANYRES32=r2, @ANYBLOB="04000000010000000000000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB="00000000060000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x80000, 0x0) accept$ax25(r5, &(0x7f00000003c0)={{0x3, @null}, [@null, @bcast, @rose, @bcast, @netrom, @rose, @netrom, @default]}, &(0x7f0000000580)=0x48) r6 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) bind$llc(r5, &(0x7f0000000440)={0x1a, 0x100, 0x7, 0x7fff, 0x101, 0x4, @local}, 0x10) sysfs$2(0x2, 0xe9, &(0x7f0000000840)=""/179) 19:25:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:09 executing program 0: r0 = dup(0xffffffffffffff9c) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fsetxattr$security_smack_entry(r1, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000040)='#\x8a-.}\x00', 0x6, 0x2) recvfrom$inet6(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x40000100, &(0x7f00000001c0)={0xa, 0x4e22, 0x1, @loopback, 0x100000000}, 0x1c) 19:25:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x5ac) [ 551.707960][T22579] XFS (loop1): Invalid superblock magic number 19:25:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:10 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/32, &(0x7f0000000040)=0x20) 19:25:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 552.279364][T22786] XFS (loop3): Invalid superblock magic number 19:25:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) 19:25:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:10 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x44000, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="0f0091f1d52e950fb65fb00f08c74424000d000000c74424020001c0fec7442406000000000f011424b9920000400f32660f3880a3f06daa832e2e3e3e660f38ddd766b81e000f00d0f30f116600b9800000c00f3235008000000f30", 0x5c}], 0x1, 0x4, &(0x7f0000000180)=[@cstype0={0x4, 0x2}, @efer={0x2, 0x8000}], 0x2) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r3 = dup(r2) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000000)={0x7, 0x3234564e, 0x4, 0x4, 0x3, @discrete={0x100, 0x7}}) 19:25:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xaf0) 19:25:10 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x0, 0x800) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:10 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000040)=0x2ad) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400, 0x0) write$P9_RREAD(r1, &(0x7f0000000100)={0x9e, 0x75, 0x1, {0x93, "775e0c974bae61caae485b96a30e3e54bfaf9dbf7768ccb3b7540a2b63d8eb2e4f56531264df6839e8e91fc06c2167e2926d25a4c2c9c3b8da61f37b07bbad996da597abe2f50e5fa30fc7ae44087f6f6bcb83780153115764bddb0a9e99936653e8b420f66d045bdcfb0dc9f019a6ad796f5801889313178ccbbd05f47fa659c962a0cec3e4994020efdf290b1244da2d2237"}}, 0x9e) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$llc(r2, &(0x7f0000000080)={0x1a, 0x31f, 0x400, 0x10001, 0x9, 0xfffffffffffffffb, @broadcast}, 0x10) 19:25:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x1068) 19:25:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 552.735890][T22832] XFS (loop1): Invalid superblock magic number 19:25:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:11 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000005540)={'bridge_slave_0\x00', {0x2, 0x4e21, @broadcast}}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000000)=0x4eef629b) 19:25:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 553.218336][T23060] XFS (loop3): Invalid superblock magic number 19:25:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x8000000, 0x0, 0x0, 0x0, 0x0) 19:25:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x15e0) 19:25:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:11 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ftruncate(r0, 0x9) syz_open_dev$dspn(&(0x7f0000001080)='/dev/dsp#\x00', 0x6, 0x3) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) getsockopt$sock_buf(r0, 0x1, 0x1e, 0x0, &(0x7f0000000000)) 19:25:11 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000800)={0x3, 0xc, 0x4, 'queue0\x00', 0x8}) 19:25:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:11 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000140)) 19:25:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:25:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x1b58) 19:25:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x50, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:12 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x207e) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0x7, 0xfffffffffffffff8, 0x100000001, 0x10000}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) [ 553.834962][T23109] XFS (loop1): Invalid superblock magic number 19:25:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) [ 554.132345][T23227] XFS (loop3): Invalid superblock magic number 19:25:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x9000000, 0x0, 0x0, 0x0, 0x0) 19:25:12 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='\x00', 0x0, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r1}) 19:25:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x20d0) 19:25:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:25:12 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000680)="63bbdf5b932bb0f6aa93a098fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d440c3167696ab2e6d28f236c138d63fe4f6ece6f3d04e9722e2480c10ff98ca15c8f808eef01259cfc427b451c281c3d4c8c6f8356b4bdba74c6354bd8502c921c2dff62e7bad03963619af20f916d36647316354aff23dc525b0b791bd9c9c218039d8d55a6f7df5de45ee66116954aabf4d87ce3d0970a55bdce078fed9df4fd288829583f861040c49fe1dcf61be6dbd4006ef210f1c52345c5228f055cb7d22509df8a4f76", 0x10a, r2) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:12 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$addseals(r0, 0x409, 0x8) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:12 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x2648) 19:25:13 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup2(r0, r0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000000c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="4aac53fbb6748b5c3be664010074", @ANYRES16=0x0, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20004880}, 0x8000) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) bind$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r2, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x48}}, 0x8000) [ 554.844047][T23389] XFS (loop1): Invalid superblock magic number [ 555.125229][T23502] XFS (loop3): Invalid superblock magic number 19:25:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) 19:25:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:13 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)=0x3b1) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100, 0x2e) getsockname$netrom(r1, &(0x7f00000000c0)={{}, [@null, @rose, @remote, @null, @default, @rose]}, &(0x7f0000000180)=0x48) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000040)={0x1000}) 19:25:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x2bc0) 19:25:13 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) r4 = getuid() r5 = getgid() keyctl$chown(0x4, r2, r4, r5) 19:25:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x315e) 19:25:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x2, 0x2, 0x8, 0x24, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e24, 0x7, @remote, 0x4f16}}, 0x9, 0x58fd, 0x8, 0x4, 0x9}, 0x98) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x4e22, @local}}) pipe2$9p(&(0x7f0000000040), 0x800) 19:25:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 555.957994][T23760] XFS (loop1): Invalid superblock magic number 19:25:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x0) 19:25:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 556.216137][T23817] XFS (loop3): Invalid superblock magic number 19:25:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xb000000, 0x0, 0x0, 0x0, 0x0) 19:25:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x20005ff8) 19:25:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000080)={r1, 0x7, 0x100000001}, &(0x7f00000000c0)={'enc=', 'oaep', ' hash=', {'cmac-aes-neon\x00'}}, &(0x7f0000000180)="54a301e3d23c7c51954e6668a6625a2adaccd73da392bbcd92b4b1abac2b21be80dfeee1264fb578401d", &(0x7f00000001c0)="4dc400e3ebf6364ae3fd6f83ac9ed6ac97f35fa1c41514d4dc360c44a9a9b1181f67f0ef8e8e503bd34f1bfe987de6738972373d71c7ef40") getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:14 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x0, 0x5, &(0x7f0000000340)='user\x00'}, 0x30) sched_setaffinity(r5, 0x8, &(0x7f0000000400)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:14 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000002c0)={0xa, &(0x7f0000000240)=[{0xbd, 0xfffffffffffffff8, 0x800, 0x7}, {0x10000, 0x5, 0x260, 0xffffffffffffffff}, {0x401, 0x100000001, 0xd7, 0x6}, {0x1, 0x100000001, 0x8, 0x64fd}, {0x3a2, 0x8, 0xfffffffffffffff8, 0x10000}, {0x4, 0x9, 0x3f, 0x8000}, {0x6, 0x9, 0x0, 0x7}, {0x3, 0x6, 0x8, 0x9}, {0x80000001, 0x7, 0xfff, 0x6}, {0x1, 0x7, 0x80, 0x4}]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xcb16, 0x40000) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000103500000426bd7000fedbdf2500000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x800) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x5, 0x1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000040)) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:14 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x7, 0xc4) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000080)=@rose={'rose', 0x0}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000000000)={'3! ', './file0'}, 0xb) 19:25:15 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 556.870432][T24029] XFS (loop1): Invalid superblock magic number 19:25:15 executing program 2: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1ff, 0x428002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20000008001, 0x81) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000080)=0x5) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="4337202e2f6620e429330a"], 0x3138) 19:25:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) [ 557.092713][T24046] XFS (loop3): Invalid superblock magic number 19:25:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xc000000, 0x0, 0x0, 0x0, 0x0) 19:25:15 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$caif_stream(0x25, 0x1, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x80000, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000240)=0x20080, 0x4) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="3321202e2f66696c65300ab3ed4b33680807c2f3ed01e201db4d5db8d1a9350cb5b54d3f36f0641b01a571bfbb6c49e8b51dc392398abab1cf989fc2282d38eaf164e3f0de03a2983a489e4df201458de7692a42dd6d55298bd43c3ec8f6c6d3cedf26f861d400fa1c6b9366d72eb92789b347ce672212713e9e3a0eceeca808c62121e34628a50cd8a96f228ac48c5116c49bc43d92144e1dc114b321d2f1d94396b169ea92482b8f204eb2e2714f5632be51a93092"], 0x3138) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707902, 0x0) recvfrom$ax25(r2, &(0x7f0000000080)=""/217, 0xd9, 0x0, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) 19:25:15 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x410000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000400)={0xaa, 0x24}) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x6cafd86517af521e) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000580)={0x18, 0x0, {0x0, @remote, 'team_slave_0\x00'}}) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14, 0x80800) sendmsg$nl_route_sched(r1, &(0x7f0000000800)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000ac0)=@deltfilter={0x590, 0x2d, 0x302, 0x70bd27, 0x25dfdbfc, {0x0, r5, {0xfff3, 0xb}, {0x0, 0xc}, {0xec3f2c1d551bf511, 0xfff3}}, [@TCA_RATE={0x8, 0x5, {0xffffffffffffffcb, 0xc005}}, @TCA_CHAIN={0x8, 0xb, 0x9}, @filter_kind_options=@f_rsvp={{0xc, 0x1, 'rsvp\x00'}, {0x548, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0xe, 0xffff}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x1, 0xa}}, @TCA_RSVP_POLICE={0x408, 0x5, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x6, 0x0, 0x3ff, 0x80000000, 0xfffffffffffffff7, 0x7, 0x7f, 0x4, 0x3f, 0x7a0, 0x1, 0x3ff, 0x3, 0x2, 0x6, 0xffff, 0x9, 0x400, 0xff, 0x80000001, 0xa86d, 0x7, 0x0, 0x800000, 0x6, 0x9, 0x100, 0x100000001, 0x8, 0x5, 0x10000, 0xfffffffffffffffd, 0x8000, 0x5, 0x2, 0xfffffffffffffffc, 0x8dfc, 0x2, 0x4, 0x7ff, 0x93, 0x2, 0x2, 0xa43, 0xb204, 0x0, 0x7, 0x2, 0x7, 0x6, 0x10000, 0x4, 0x9cc, 0x5d, 0x80000001, 0x3b04, 0x8, 0x80000000, 0x3, 0x7ff, 0x7, 0x0, 0x7, 0x0, 0x5, 0x2, 0x884, 0x3f, 0x4, 0x0, 0x65, 0x8001, 0x7, 0x1, 0x8, 0x20, 0x0, 0xe2, 0x1, 0x1, 0x2, 0x1, 0x7, 0x100, 0x5, 0x4, 0x3ff, 0x40, 0x9, 0x91c, 0x6, 0xffffffffffff868c, 0xf6e3, 0x1, 0x5, 0x1, 0xffff, 0x40, 0x6, 0xffff, 0x8, 0xffffffff, 0xfffffffffffffffe, 0x75, 0xfffffffffffff801, 0x4, 0x7, 0x4, 0x2, 0xe3, 0x2000000000000000, 0x0, 0x5, 0x10001, 0x7, 0x1f, 0x80000000, 0x6, 0x0, 0x80, 0x6, 0x81, 0xffffffff80000000, 0x2, 0xce0f802, 0x9, 0x69, 0x6a04, 0x8, 0xde, 0xffffffffffffff7f, 0x4865, 0x7fffffff, 0xfffffffffffffff7, 0x9b, 0x5, 0x5, 0xfffffffffffff801, 0xfffffffffffffc01, 0x3, 0xf85f, 0x4, 0x3035, 0x73df, 0x3, 0xa591, 0x100000000, 0xc4, 0x1, 0x80000000, 0x38c2, 0x8, 0x8, 0x0, 0xfff, 0x100, 0x5, 0x2, 0x200, 0x8, 0x100000000, 0x8000, 0x6, 0x80000001, 0x2, 0x0, 0x100, 0x200, 0x1, 0x38, 0x6, 0x6241, 0xb5b7, 0x7, 0x8000, 0xfffffffffffffff9, 0x9, 0x7, 0x5, 0x80000001, 0x6, 0x2, 0x2, 0x3f, 0xffffffff00000000, 0x229fe78b, 0x10000, 0x7ff, 0x100, 0x8001, 0x3, 0x100, 0xffffffffffffff00, 0x10001, 0x2f, 0x4c3, 0x5, 0x1, 0x80000001, 0x1f, 0x0, 0x8, 0x8, 0x6d7, 0x1000, 0x3, 0x4, 0x1, 0x7, 0x2, 0xffff, 0x4929, 0xff, 0x1, 0x80, 0x1000, 0x55, 0x7, 0x29, 0x5, 0x5, 0x1, 0x7, 0x10001, 0x7, 0x40, 0x8, 0x7, 0x5, 0x7, 0xffffffff, 0x1, 0x9, 0x3, 0x9, 0x4, 0x7, 0x401, 0x3f, 0x516c, 0x8, 0x200, 0x2e2, 0x1, 0x4, 0x0, 0x8, 0x1, 0xff, 0x16, 0x800, 0x100000001, 0x1, 0x80000000, 0xfffffffffffffffd]}}, @TCA_RSVP_POLICE={0x40, 0x5, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0xffffffffffffffff, 0x7, 0x1f, 0xce, {0xfffffffffffffff8, 0x0, 0xfffffffffffffeff, 0x7f, 0x1ff, 0x357d}, {0x7fff, 0x3, 0x9, 0x7ff, 0x29}, 0xffffffff, 0xdd8c, 0x5}}}, @TCA_RSVP_ACT={0xdc, 0x6, @m_bpf={0xd8, 0x3, {{0x8, 0x1, 'bpf\x00'}, {0x3c, 0x2, [@TCA_ACT_BPF_OPS_LEN={0x8, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x1c, 0x4, [{0x6, 0xe8a, 0x8, 0x1c5}, {0xffffffffffffffe1, 0x1, 0x5, 0x7}, {0x6, 0x8, 0x0, 0x400}]}, @TCA_ACT_BPF_OPS_LEN={0x8, 0x3, 0x1}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x8c, 0x6, "aa8a9dd3862fcb91a1b008c554c293279e6d9025d0e9f6336175b41c25de6f798e543eb1aff71706ff0dce2cde54386d0eed0c07ed08480e29d76dd9249d8d909664bc4d0092b4bac4a9faff65a0f8abdbdced80c1e6322c8b561ff05f373cb36e273a8d929a9461e53c99f34919d5fb3afc4bfe2467f69e5883369052b90c2cb1979c5222"}}}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xffff, 0xf}}, @TCA_RSVP_SRC={0x8, 0x3, @remote}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x590}, 0x1, 0x0, 0x0, 0x20004040}, 0x1) 19:25:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:25:15 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x1, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000200)={0x3, 0x5, [{0x6f, 0x0, 0xfad}, {0xff, 0x0, 0x5}, {0x5db4aaf3, 0x0, 0x7}]}) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40400004}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, r1, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = msgget(0x2, 0x1) msgctl$IPC_RMID(r3, 0x0) 19:25:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80600, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) r2 = socket$inet6(0xa, 0x0, 0x5) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet6_int(r0, 0x29, 0x7d, &(0x7f0000000000), &(0x7f0000000080)=0x4) getsockopt$inet_dccp_buf(r1, 0x21, 0xc0, &(0x7f00000001c0)=""/91, &(0x7f0000000240)=0x5b) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f0000000100)=0x1) 19:25:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 557.718357][T24298] XFS (loop1): Invalid superblock magic number 19:25:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:16 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) flistxattr(r0, &(0x7f0000000000)=""/162, 0xa2) getpeername(r0, &(0x7f00000000c0)=@xdp, &(0x7f0000000180)=0x80) [ 557.934952][T24411] XFS (loop3): Invalid superblock magic number 19:25:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xd000000, 0x0, 0x0, 0x0, 0x0) 19:25:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)=0xfffffffffffffee2) 19:25:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x1f, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e1e, 0x800000000000002, @mcast2, 0x6}, 0x1c) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2080, 0x0) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, 0xf, 0x835, 0xb, 0x5, 0x0, 0x70bd2d, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x1581f03b42c7e4b0, 0x4e23}, @sadb_x_sa2={0x2, 0x13, 0xfffffffffffffffa, 0x0, 0x0, 0x70bd2a, 0x3505}]}, 0x28}}, 0x8010) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:16 executing program 5: r0 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='md5sum)securitysecuritywlan0{\x00', 0xfffffffffffffffa) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000ac0)="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", 0x182, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r1, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) socket$inet_udp(0x2, 0x2, 0x0) [ 558.459191][T24552] XFS (loop3): Invalid superblock magic number 19:25:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:16 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000340)='\x00', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 558.697359][T24574] XFS (loop1): Invalid superblock magic number 19:25:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:17 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) fcntl$setsig(r0, 0xa, 0x25) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x37, 0x0, &(0x7f0000000140)) ioctl$sock_bt_hci(r1, 0x0, &(0x7f0000000100)="b3297efca8f4c0182a9f8bb58a12cbef8bc6404b61d09f385ae1b108ce62aadbb41b7c3b045edc") ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000040)={0x9, 0x8, 0x2}) mq_unlink(&(0x7f0000000080)='user.@cpuset\x00') ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000000c0)={'nr0\x00', {0x2, 0x4e20, @broadcast}}) r2 = semget$private(0x0, 0x0, 0x1) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000180)=""/4096) 19:25:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="a45c67955b7c375b2f78945e7af1e93b772ce5f76227130f402692042d4bc96d97871974060f20fc381330c0b810c4524d139094c953223d4f80f0126c9d562707bdb9bc4d4fbb53c61d836312e27f68af689464f2e24fb7a44f96e8390323a0f22e625b085f06bc3df7ccdbd361b3827ceba5ddfb177e29766c71175898b5c13f98fb8fc80aa1e22df555782304ab3de71e4709a0b854d4bc03446b64755d1c0d00b19eb2f597f4e0e6674cb08fb3c49cd57bb61107616b273b5102e4e378f1302265a127a7de402111b7b2396b18b93731d73ea358b16e2dbd8f6d3ee2aeb4f80357cc467b1f4f4f"], 0x3138) 19:25:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 559.231962][T24777] XFS (loop3): Invalid superblock magic number 19:25:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0xe000000, 0x0, 0x0, 0x0, 0x0) 19:25:17 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x4000) getdents(r0, &(0x7f0000000080)=""/91, 0x5b) bind$bt_rfcomm(r0, &(0x7f0000000100)={0x1f, {0x9e7, 0x4, 0x6, 0xdd7, 0x6, 0x200005}, 0x1b9b}, 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)=0xfffffffffffffffb) 19:25:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321204d28d56c0c640501"], 0x3138) r1 = getpid() ioprio_set$pid(0x2, r1, 0x7) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 19:25:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:17 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$void(r1, 0x5450) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000006c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000500)={0x160, 0x0, 0x705, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7718}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcf}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x4008000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x2e0, r2, 0x400, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe87}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfa1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @mcast1, 0x7f}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x98}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb27}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2e0d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6ce5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffff80}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x480}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) 19:25:17 executing program 5: recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000980)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/36, 0x24}, {&(0x7f0000000680)=""/242, 0xf2}, {&(0x7f0000000780)=""/249, 0xf9}, {&(0x7f0000000880)=""/154, 0x9a}, {&(0x7f0000001ac0)=""/183, 0xb7}, {&(0x7f0000000940)=""/15, 0xf}, {&(0x7f0000001b80)=""/193, 0xc1}, {&(0x7f0000001c80)=""/4096, 0x1000}], 0xa, &(0x7f0000002d40)=""/4096, 0x1000}, 0x10102) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000003d40)=0x1, 0x4) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r1, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000000240)={0x7, 0x4d, 0x2}, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 559.654784][T24882] XFS (loop1): Invalid superblock magic number 19:25:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xb2, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000, 0x200000000000003e) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:18 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x400000000001c, 0x0, &(0x7f0000000040)) 19:25:18 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000580)={0x7fff, 0x0, 0xfb, 0x405}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f00000003c0), &(0x7f0000000400)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 560.163904][T24982] XFS (loop3): Invalid superblock magic number 19:25:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 19:25:18 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x2000, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x640200, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x2d, &(0x7f0000000040)={@broadcast, @remote, @initdev}, &(0x7f0000000080)=0xc) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)=0x107c00a87877ad01) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000280)=""/255, &(0x7f00000000c0)=0xff) 19:25:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) 19:25:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:18 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x118) [ 560.561754][T25149] XFS (loop1): Invalid superblock magic number 19:25:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc4, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:19 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x81, 0x0) recvmmsg(r0, &(0x7f0000004cc0)=[{{&(0x7f00000002c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000340)=""/119, 0x77}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/52, 0x34}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000540)=""/127, 0x7f}, {&(0x7f00000005c0)=""/157, 0x9d}], 0x7}, 0x7}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000700)=""/153, 0x99}, {&(0x7f00000007c0)=""/141, 0x8d}, {&(0x7f0000000880)=""/212, 0xd4}], 0x3, &(0x7f00000009c0)=""/184, 0xb8}, 0xb}, {{&(0x7f0000000a80)=@generic, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000b00)=""/221, 0xdd}], 0x1, &(0x7f0000000c40)=""/118, 0x76}, 0x9}, {{&(0x7f0000000cc0)=@sco, 0x80, &(0x7f00000020c0)=[{&(0x7f0000000d40)=""/240, 0xf0}, {&(0x7f0000000e40)=""/48, 0x30}, {&(0x7f0000000e80)=""/20, 0x14}, {&(0x7f0000000ec0)=""/222, 0xde}, {&(0x7f0000000fc0)=""/98, 0x62}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000002040)=""/75, 0x4b}], 0x7, &(0x7f0000002140)=""/192, 0xc0}, 0x6}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000002380)=[{&(0x7f0000002280)=""/241, 0xf1}], 0x1, &(0x7f00000023c0)}, 0x72}, {{&(0x7f0000002400)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000002500)=[{&(0x7f0000002480)=""/17, 0x11}, {&(0x7f00000024c0)=""/30, 0x1e}], 0x2, &(0x7f0000002540)=""/177, 0xb1}, 0x9}, {{&(0x7f0000002600)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003a40)=[{&(0x7f0000002680)=""/184, 0xb8}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/112, 0x70}, {&(0x7f00000037c0)=""/228, 0xe4}, {&(0x7f00000038c0)=""/45, 0x2d}, {&(0x7f0000003900)=""/96, 0x60}, {&(0x7f0000003980)=""/48, 0x30}, {&(0x7f00000039c0)=""/125, 0x7d}], 0x8}, 0xfffffffffffffffc}, {{&(0x7f0000003ac0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/24, 0x18}], 0x2, &(0x7f0000004bc0)=""/216, 0xd8}, 0x3}], 0x8, 0x40000000, &(0x7f0000004ec0)) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000004f00)={r2, 0x1, 0x6, @remote}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000200)={{0xa, 0x4e24, 0x716, @ipv4={[], [], @remote}, 0x7fffffff}, {0xa, 0x4e22, 0x6b44, @empty, 0x8001}, 0x2, [0x8000, 0x7fff, 0x1, 0x4, 0x5, 0x3, 0x1a44, 0x6]}, 0x5c) r4 = open(&(0x7f0000000000)='./file0\x00', 0x14000, 0x101) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="00002d10000000"], 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x4) 19:25:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) chdir(&(0x7f0000000280)='./file0\x00') write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) getgroups(0x3, &(0x7f0000000100)=[0xffffffffffffffff, 0xee00, 0xee01]) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8f0000005e242ad00100000007007668893cf111679d00000000000000000000030000000900000001000000282a006d643573756dd347504c2e2f00266c6f76626f783a637075736574776c616e316b65bf2be0dc676367726f7570707070310300", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x8f) 19:25:19 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000340)) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000400)={0x1b, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="01634040030000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000400000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="580000c000000000003000000000000000200000000000000030dfffffff000000"]], 0xffffff73, 0x0, &(0x7f0000000680)="707e0ea3491af613ad9249ff747105b0ca94ee52c849e763a324289807eb4555c57d73f3275308e99e892123c9ff78706b5c0895a2e07469c7f5e7e9758a435e37c9f8cc45719234041dc0d777ee92c2bfbc21424c9517316d4f749fc144206fb447e602bf694e1bdccd4401956b4a9d1a545cec99e5745468d8f6634af63fa8fe0c68c4d8d27e6662c386e620155761d1e3a57d17040fc9eb614a43da7df29705ef4bd382b4f087072f41cce8a76a471f89e0af9c14fe33b535cda8b53c6caddd7a6882a5560ebecc1d9c894a1f0df3399b3bf2af0fb46cab660000"}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0xffffffa6) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 561.110132][T25372] XFS (loop3): Invalid superblock magic number 19:25:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x12000000, 0x0, 0x0, 0x0, 0x0) 19:25:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x400002) ioctl$NBD_DO_IT(r1, 0xab03) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xfffffffffffff1b7, 0x80) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 561.531618][T25480] XFS (loop1): Invalid superblock magic number 19:25:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x40000) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000180)={0x4, 0xd7, &(0x7f0000000080)="06842e9012da41e25c3325a307f985db661ba7ba6c7788c7a514c0b67a5f1bc17d10d1da543aebdc7ad01d342274feae4e5629e40f01c073f089deab28a6fa6440aea4a62b2588bc06795f0eeadf4103fadad11f444aef695605a656ec382568a944e411d4aa19a1a87774b2a27b2d07794a5a2f71c7fa255b9d853c2b9d95865e2389f921ac83aedeb4390635b27364ed16c6e507f8eb43518f580bd6f7101dd42b257e3beddb657476d83a0d6890fcc3a1d04294745ffbd7e8db1d2da0e7942dedbafe20fe13a4762491193dff2b8cb5c849f0177fb5"}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:20 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e25, @remote}, 0x1) 19:25:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf4, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:25:20 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 562.027703][T25674] XFS (loop3): Invalid superblock magic number 19:25:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1a000000, 0x0, 0x0, 0x0, 0x0) 19:25:20 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 19:25:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:25:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3321202e2f66696c65300a1e2cb1d5727e7ff1b238bd8be1871d4f25cf862f2f96e2126a3e6ad51a2e60329749fd2629dda107c7bb91ade3615e559411797a31ecd4e0cf9568def46ab9449fc9786ce0f4ad248c55664fd83fb6f774d2afd7f2215130c6c3465ba7e23e3bb8b200ac2eac991679c7fd9676474b7351e8b67f6694290bbd4cca99d8e0ccf60bc29cfa054f7065710000dd73f0f96598bb66b843472a37e23b0dd01c9a94eed4b61709199e2f3eb99ee8e6092ea34a252837dcafb360254090cf77bb12d165"], 0x405) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000080)=""/113) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000000)={0x0}) shmget$private(0x0, 0x2000, 0x10b, &(0x7f0000ffc000/0x2000)=nil) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000180)={r3, &(0x7f0000000140)=""/37}) 19:25:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:25:20 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xee, 0x980) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x5, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x330) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) recvfrom$rose(r3, &(0x7f0000000680)=""/178, 0xb2, 0x40000002, &(0x7f0000000340)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}, 0x40) 19:25:20 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3f, 0x0, &(0x7f0000000040)=0x5f4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x800, 0x4) 19:25:20 executing program 2: prctl$PR_GET_TIMERSLACK(0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x0, @remote, 0x100000001}], 0x1c) r1 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x2, 0x3}, &(0x7f0000000100)=0x8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="332120859695e7ba4b51dc41f04f6d2e2f66699fc4cbc734de45c4ae7aa6794d6c65300a6b354c3b552c38bee53ebe5b7d482c95d3f0ca4fa3edee934565e065dfdb692a84f4070000000000002b44e4e74c28bbd9942787486ef5ac92e0ebd6de7d0802b356da72e7061a"], 0x3138) [ 562.600966][T25851] XFS (loop1): Invalid superblock magic number 19:25:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x17e, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)=0xffffffffffffffea) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "9545a01495650ee49ceaa6684591ce4bbe8d34770220a493f2b9f5fdb708d120", 0x7d24, 0x3, 0x20, 0x0, 0x2c8}) 19:25:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e22, @local}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0xa2ff560a76a6c3af) r4 = dup2(r2, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r5, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffffc}}}, 0xa0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 562.848654][T25997] XFS (loop3): Invalid superblock magic number [ 562.988140][T26112] XFS (loop1): Invalid superblock magic number [ 563.251616][T26125] XFS (loop3): Invalid superblock magic number 19:25:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1c000000, 0x0, 0x0, 0x0, 0x0) 19:25:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:21 executing program 0: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000000c0)={0x6, "ea2a7bdbbf74eb33c2a6fc83bf89a393569850081615abe94868ca81367b773f", 0x8, 0x0, 0x4, 0x5, 0x5}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x30}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x401) 19:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x7ff, 0x1, 0x0, 0x10000, 0x3}, 0xc) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200)={'3! ', './file0', [{0x20, 'selinuxlolousereth1)$&nodevvboxnet1wlan1security'}, {0x20, '3! '}, {0x20, '\x00\x00'}], 0xa, "41c2ca176e427fec5e03ff22384319711e845f57738fd2"}, 0x5a) 19:25:21 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) socket$nl_route(0x10, 0x3, 0x0) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:21 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000040)=0x280) 19:25:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x5479) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321200e2666696c02000a"], 0x3138) [ 563.674662][T26208] XFS (loop1): Invalid superblock magic number 19:25:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x180, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:21 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = getpgrp(0xffffffffffffffff) capset(&(0x7f0000000000)={0x0, r1}, &(0x7f0000000040)={0x3, 0x9, 0x400, 0x6, 0x9, 0x6}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 564.013168][T26274] XFS (loop3): Invalid superblock magic number 19:25:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1c020000, 0x0, 0x0, 0x0, 0x0) 19:25:22 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20001, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v2={0x3, 0x1, 0x12, 0x7, 0x3e, "1042ab6f466a202e0ee14050e4ec8602b4c9bf55a166cd83d4c4c776b249feedf74248aa57bf3d276e535cc350b96275cf9af846dbcc13325427a3ceff85"}, 0x48, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000180)={0x76d6, 0x5c37, 0x6, 0x0, 0x0, [], [], [], 0x8, 0x4}) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000480), 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x6, {{0xa, 0x4e24, 0x4, @rand_addr="5b343c58deb22ae7db76f77fe0ffd694", 0xffffffffa588a01f}}}, 0x88) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)=0x907421ec629073f8) memfd_create(&(0x7f0000000040)='\x00', 0x0) flistxattr(r0, &(0x7f0000000380)=""/223, 0xdf) 19:25:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="3321204d2fca6d351ccf66abc2985184d232f4da77fb3d5324ad16b1b55c42d2a2cbbced00969befaa18b9958c544d28d12f62212c11f414a02be23c89e89d8e416d593c43eeb22884737ff4007c666f9d9e58578be2c8a9f10fd287bc46e477de9d8cef6ed5985ef30ec90b390cdb748d48c751d30f0620540f442b35ea6ae3971e89c8f2d98ff8f7465e8e11be8008ac727d37ffa0cdec9c0bafe72f9e170c7a78f627"], 0x3138) 19:25:22 executing program 5: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key(&(0x7f0000000580)='big_key\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000680)="288df6b3eea77b4cfcf3248c5e0bb67f005c19522a798c4e96a9ec125a43aff6756d97b48cd83de48355b2fe73079ca4eeb8f43dd20f6a90377ad897b74492daa40393693691ec00d4f32a7611a9b27f8a7d04968d234846e5d4c382d1f22cc93309ad56ddcb0f22d57a92bbe92877da8956e2c80f8598d8452d0df8b9bb8d499418fae6523e0af2ea3da2bb67441a2d1474581201f9441ea46caba7b7fa5ce0ff5fe853b4648c8e237d726d00f5729d7e77932e2428bc9a1a658ca6", 0xbc, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000740)={'syz', 0x0}, &(0x7f0000000380), 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r1, r3}, &(0x7f0000000780)=""/240, 0xf0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f0000000380)={{0x40, 0x9, 0x0, 0x7fffffff, 0x0, 0xffffffffffffffe0}, 0x4eee}) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 564.485933][T26404] XFS (loop3): Invalid superblock magic number 19:25:22 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4440, 0x64) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) getpeername(r0, &(0x7f0000000400)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000480)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bond_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000880)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000b80)={&(0x7f0000000040), 0xc, &(0x7f0000000b40)={&(0x7f00000008c0)={0x258, r2, 0x109, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x134, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0xbc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xd1}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x101}}}]}}]}, 0x258}, 0x1, 0x0, 0x0, 0x8001}, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:22 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff6d) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x40000, 0x0) write$P9_RRENAMEAT(r2, &(0x7f00000003c0)={0x7, 0x4b, 0x2}, 0x7) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 564.823216][T26482] XFS (loop1): Invalid superblock magic number 19:25:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1d4, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:23 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) [ 565.173535][T26586] XFS (loop3): Invalid superblock magic number 19:25:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 19:25:23 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$pppoe(0x18, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x904}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x40, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000280)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3321205f5f66696c65300a6564fe29bab06a0e9b22a362ac8d3f599070a9cccb0ee26c43f9bc1b43f2402192b6c8b8c038bc44050657614645032a0a59048a7e6df761d37c915ed5b95917692c74b82f9b27606467ae5b0a4007d05e09dd831ad4cea3a4a7236ae89e80e2b6bbe41c623420b2f1be2ae0e499c1fa"], 0x3138) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x200, 0xc1, 0xfffffffffffffffb, 0x81, 0x0, 0x6, 0x10, 0x1, 0x2, 0x7, 0x9, 0x1dca, 0xffffffffffff78cd, 0x1, 0x3, 0x100, 0x0, 0x2, 0x166b, 0x9, 0x7, 0x7, 0x3, 0x2, 0x62, 0x7, 0x2, 0x4, 0xfffffffffffffff9, 0x0, 0x0, 0x3, 0xfffffffffffffffa, 0x9, 0x3, 0x6, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x4, 0x7ff, 0xf, 0x2, 0x1, 0xfffffffffffffff7}, r2, 0x2, 0xffffffffffffffff, 0x8) socketpair(0x3, 0x80000, 0x5, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f0000000180)={0x40, 0x4, 0x6, 0x1}) 19:25:23 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000340)=0x4, 0x4) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) unlinkat(r3, &(0x7f00000003c0)='./file0\x00', 0x200) 19:25:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1de, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:23 executing program 0: socketpair(0x8, 0x800, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0xe3}}, 0x4, 0x5}, &(0x7f0000000380)=0x90) r3 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x6, 0x48000) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f00000003c0)={0x0, 0x80000001, 0x9, [], &(0x7f0000000100)=0x7}) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000340)={0x32cc0, "b55094f13f891625fb259509ee5dc467e8de88f20f0df2a589e48e8b5c839089", 0x3}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e22, 0xfff, @empty, 0x7f}}, 0xfffffffffffffffa, 0x5, 0x6, 0x3, 0x3}, &(0x7f0000000240)=0x98) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r4, 0x1, 0x1c, 0x0, &(0x7f0000000140)) bind$tipc(r0, &(0x7f0000000580)=@name={0x1e, 0x2, 0x0, {{0x43, 0x1}}}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r3, &(0x7f0000000400)="5b697893", &(0x7f0000000440)=""/225}, 0x18) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 19:25:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e3a130f47a0e937b407000000000000002f666928e7"], 0x3138) 19:25:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 565.937662][T26691] XFS (loop3): Invalid superblock magic number [ 565.943792][T26782] XFS (loop1): Invalid superblock magic number 19:25:24 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000240)) sendto$inet(r1, &(0x7f0000000040)="b7e0d9b31323142b036f8cf361889aa015806f872de765e8d10efb8df067b12db7cb26ee5f7f1049", 0x28, 0x4004014, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) openat$cgroup_int(r1, &(0x7f0000000280)='cpuacct.usage\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = getpgrp(0x0) ioprio_get$pid(0x6, r3) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x202, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x5}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x2000c005) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 19:25:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000080)='^\\\x00', &(0x7f00000000c0)='system&ppp1user&{systemcgroupeth0\\vboxnet0%,!vmnet1\\\\}lo-md5sumGPLvboxnet0\x00', &(0x7f0000000140)='3! ', &(0x7f0000000180)='+\xe0\x00', &(0x7f00000001c0)='3! ', &(0x7f0000000200)='3! ', &(0x7f0000000240)='[\x00', &(0x7f0000000280)='\x00'], &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='wlan1eth0cgroupselfmime_type\x00']) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:25:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x20100000, 0x0, 0x0, 0x0, 0x0) 19:25:24 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="74b04095f190b6119754c14182743040ee2e9b99477d92c68f8bcc23552146dc705ba32086a4d79a1f243a5f4bd8b8306fc9d47ca9f51fea6628de2ddb450175f6aba37bd1e71f46a32fe1e9cbab196359d75edd5f62b8cc95cdde69432f5ecff2d820ab8180dbee056a61d79c8d70ed632aff372dc6e1b787f02bca06b30cd801d21434faa79aea841a13ae037aa870e356a40cc769d106ba30450f1f4e2d5b68b94e570428f9732c1a5c71ba", @ANYRES16=r2, @ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x881}, 0x24004040) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={0x0, @rand_addr, @loopback}, &(0x7f0000000300)=0xc) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000340)=r3) readlinkat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 19:25:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x100, @ipv4={[], [], @loopback}, 0xc}, 0xffffffffffffff2f) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:24 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2a5) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r1, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000400)={0x8000, 0x4, 0xdf}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x230, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:24 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 19:25:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) [ 566.776841][T27062] XFS (loop1): Invalid superblock magic number 19:25:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:25 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000380)="1adc1f123c12a41d88b070") r3 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r3, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x2c9, 0x0}}], 0x3aebf4e, 0x934) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x3ff00000000, 0x7, &(0x7f00000016c0)=[{&(0x7f0000000180)="3501f487426f00deaa8f4b19b311e696e00f601898f134608405761194986f8cad7c598f1499ea64b19547cc3fea210f73819cd41d7d0ddf60df91dfd734f278e68a3f1a34b10664b1a284166c08c4bb1985fadcb460aaa2e2a60c9a36e81791581f20cadb2f604c30e3a1a85da078392b871a1b61b32bc95a4440fd59df95c68440d04e5596dc3378f6c4f4642476299dba15b95f5a23ee2940d15c88c1394abbfa57b487c17b57390acce8aa779feb", 0xb0, 0x80000001}, {&(0x7f0000000240)="b1e06e6b2d81cd52ff01be74a190a6f9912a211a3ca50c9503bbf1ce52fb2be3250909b7724a5613369f6705a28d404fa90a365f99601dd98d3c68877ae64190fe0488a4ac08a863f3f8a0602f8ddaab7ead872b142b58be7be3aec06b84edf47374c56e4fec4949008ed750cd627c23dff1ebc1f22cfdba36d55f36741202133a3fa2936b5f8ddf419a1ac6ad341f77b5a1d3614c6433671426d861b144cdf43c6fa886c40fb65cafb8d062593845c206e16ce50fa1480122f39c73d04f4ab358c2cf84a2a1ed30d72b96ed48d3716c8a2629c804f8f9205b9faeadb74ea9c945d52d379482451b76dac03bdf3511f394a2a9f8153226", 0xf7, 0xa2}, {&(0x7f00000003c0)="2a3696ef5d8477ecfa9d074375ebb7c511c58e72e5d6f1b1a9a30d85de7296602ad73a41686900744e5212f5f64b6f58fd827bc3a630f5e284c9fc8910f0f335bdf562f6f70c26fca156302e2c43113d9b34172c289ce6b2a6cd4428683eddd57e2172191f7efc592b07ebbe6efa728750bf31e3cb1e6e5184ce2d11c6602ddddb839f9b1314af041829ca4c1ab1fd3ca05ba6d700582135cc58212366bed02fed1237d55dfc9a345b9b6847628fee5c3f5523ba6d5af0c6bcc851c296b9bd4a38187504559c4fc45ab107365d3400dffa2401b9a6b2156fccac4814fb28", 0xde, 0x80}, {&(0x7f00000004c0)="845f76d35fb41cff4c4e5c4136fc4f9ccb15528f21e58217b8002fd89110a68b45ceb0d6be429ad31780d293366797b0ff0716feba6e3f45fc050e1e6e08ab5a3282f7f9a46211ea8d241e3c5eb89107ba8a08b26c18e475af2a5a0a3dfcf1ebf03a3851be05672afd01a69fd995e334aecfea2482fc6d3ac21e0a9f45adf6eee5b46542e6b80e386effa03baebe2c1400141cd53eb99ade98905a77a42e2132a4f1ebd3cf9f07b0d6e811e338fc31ee3d4180b044325c42fc4128ff52e0a8bb142e6db850b1416a4edd743d4b00b6ba1518095cd4cb508461d105c472a6b6", 0xdf, 0x1}, {&(0x7f0000000340)="12dd9c3b24d968305256859abae87c485f473b1f9db86d1933925709e672f6481aa0e8f3d2", 0x25, 0x4}, {&(0x7f00000005c0)="37d885a481113bbbf6e30546b2ab4c84e6b4e8592b441e996c14e83359a8ad396b24a60e8d4d2bd94f5736d854c7872a9e04468de0accf222fd7226701cbb6d130a5b1f20bdb30625256d0e1fdad7d954b4391a12ad80951d3531f70239fd2ebca1b9f61384654349895fd5e0cd02f4bd62d9a6db4324b87ad7c851b9fa89789c1ea20594f6e62463ae1a318bfa063532712cb8929f3dc1a0c1d1dd42404b66eed74e4c0933c6dcc4a08", 0xaa, 0xa2f}, {&(0x7f00000006c0)="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", 0x1000, 0x80000001}], 0x200004, &(0x7f0000001780)='trustedlo!$\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) 19:25:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 567.004336][T27183] XFS (loop3): Invalid superblock magic number 19:25:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x23000000, 0x0, 0x0, 0x0, 0x0) 19:25:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:25 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x100) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000040)={0x5, 0x8, 0x1}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000080)={0x4, 0x2, {0x0, 0x2, 0xcaf, 0x3, 0x100}}) 19:25:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3! ./fi,e0\n'], 0x3138) [ 567.819005][T27432] XFS (loop1): Invalid superblock magic number 19:25:26 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffc1b) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:25:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x23e, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:26 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup2(r0, r0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1d, 0x0, &(0x7f0000000140)=0x602c4c81f494210f) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000440)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x87\xf6\xb6y8uo\xb5\xb7\x84\xf5\xfe\xe1\x88DH\xf3\x91\x96o\xa2G\x18\xd4\xc8*R6\x84\xfb\xfbU<\xa8d2\x8b\x99$|\xd1\xd4\xfa\xff\xab\xf1\x98O\xe5\xe3\xf0\xe5i\x7f\x88\xd7O\x93Q\xe2\x15\x81y\x9f\x9b\xfbm,hU\x94O9P\xdd\x9f\xfe\xc4\xfc7\x0e\rn\xe8\xc2\x1c\xeb\x04E2', 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x4) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f00000000c0)={r5, r6}) 19:25:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000)=0x7, 0x4) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="33300a000000fdaaa7e9f1"], 0x3138) 19:25:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:26 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x10) sendmsg$unix(r1, &(0x7f0000000300)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="148bac7a57248c6b2d306567ae2ba941e2566624ecbcc8fe6f2797aa12e61c1d0a0242e412beec37ae9dd11b9d49f93b437de3b02fd4ffb6df1e56f634098745d3111038ab4ac28fe83cd091b1f5911e2100e8559f37672f64bd7305490a2e49385dd9afb8418bf84b6bdb6b2faf791bc15b1cbb2188a713d100280e191af9be0a2b212b824ee305c91698ca76dcc9876bec538e42d9910d6bf1bc55fda8ce4a9e1834d7cadb1b8e9159bdb4059c6ab57f2cbe573b44bee5cef96b193039a59d91ee263a0dc389df90c0d84c41cbe284", 0xd0}, {&(0x7f00000000c0)="f1491ca7912c003c21e68a6595d22ffccfe7445c6c34343c26130280", 0x1c}, {&(0x7f0000000100)="c789ad44ea92804e0db952163bb96a61d3cabe68741728afabef93efe6372d0159124173", 0x24}], 0x3, &(0x7f00000002c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18, 0x80}, 0x8084) [ 568.070895][T27553] XFS (loop3): Invalid superblock magic number 19:25:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:26 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000040)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, @in6={0xa, 0x4e24, 0xfffffffffffffff7, @mcast1, 0x1}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r2, 0x3}, 0x8) 19:25:26 executing program 2: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'3! ', './file0', [{0x20, '}self\x91wno`ev\x00\x00\xd5\x00'}, {0x20, '\\*!user'}], 0xa, "b4494bde9357ea0d0fcdc65d73cdbd1bfda36c5430d2d4d3604d4e2acf0a7ffa740bdb6d4af00541412e3489e00cec5e951059ebb8fe9aec7e5006b6d6b0740c7e7f8eead00ddb5cec68"}, 0x6e) 19:25:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x28000000, 0x0, 0x0, 0x0, 0x0) 19:25:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 568.657951][T27701] XFS (loop1): Invalid superblock magic number 19:25:27 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) mq_open(&(0x7f0000000340)='queue0\x00', 0x803, 0x20, &(0x7f00000003c0)={0x1, 0x12, 0x400, 0xfaa9, 0x800, 0x6, 0x1, 0x9}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x6, 0x102c1) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) bind$bt_l2cap(r2, &(0x7f00000000c0)={0x1f, 0xf73d, {0x6, 0x239, 0x3, 0x12ff, 0x89, 0x1}, 0x3, 0xf97}, 0xe) 19:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @local, 0x2}, 0xd) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffff, 0x2) write$vhci(r1, &(0x7f0000000100)=@HCI_EVENT_PKT={0x4, "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"}, 0x1001) r2 = shmget(0x3, 0x2000, 0x84, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000091e2dab96978f9219f84434778e37de89436ac675bf0c6bec39dc1dc0bc1f862263463ea22e6a68c32887a92c7fae5f750472b065691325921ffa847d9b4c660c0b51a3f50f9883847a62e1eb4e2962eb0cc3cca0231a52b83e6a97373695"], 0x3138) 19:25:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x24c, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xb0, 0xac7, 0x6, 0x5e}, {0x1, 0x8, 0xb8c0, 0x206}, {0xb87a, 0x0, 0x7, 0xb12}]}, 0x10) 19:25:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xe50f, @remote, 0x9}, 0x1c) 19:25:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3e0000000, @bcast, @rose={'rose', 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x501600, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000040)=0x3, 0x4) [ 569.048423][T27826] XFS (loop3): Invalid superblock magic number 19:25:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x32000000, 0x0, 0x0, 0x0, 0x0) 19:25:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)=0x0) setpgid(r1, r2) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_buf(r3, 0x0, 0x25, &(0x7f0000000040)=""/112, &(0x7f00000000c0)=0x70) [ 569.644290][T28069] XFS (loop1): Invalid superblock magic number 19:25:27 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = syz_open_dev$sndpcmc(&(0x7f0000000580)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101000) bind$vsock_dgram(r3, &(0x7f00000005c0)={0x28, 0x0, 0x2710, @host}, 0x10) bind$vsock_dgram(r3, &(0x7f0000000340)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000003c0)=0x7, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r0, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/audio\x00', 0x800, 0x0) execveat(r5, &(0x7f0000000400)='./file0\x00', &(0x7f0000000900)=[&(0x7f0000000680)='\x00', &(0x7f00000006c0)='/dev/audio#\x00', &(0x7f0000000700)='/dev/audio#\x00', &(0x7f0000000740)='syz', &(0x7f0000000780)='mime_type\x00', &(0x7f00000007c0)='/dev/snd/pcmC#D#c\x00', &(0x7f0000000800)='/vmnet0!\x00', &(0x7f0000000840)='/dev/audio#\x00', &(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', &(0x7f00000008c0)='\x00'], &(0x7f0000000c00)=[&(0x7f0000000980)='\x00', &(0x7f0000000ac0)='ppp1\x00', &(0x7f0000000b00)='^]\x00', &(0x7f0000000b40)='\x00', &(0x7f0000000b80)='$-user@ppp0md5sumvboxnet1\x00', &(0x7f0000000bc0)='/eth0V\x00'], 0x1000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x87c, 0x1, 0x7, 0x1}, {0xb6d7, 0x8, 0x3, 0x20}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x10000, 0x80a00) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000100)) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x3138) 19:25:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:27 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000340)) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000400)={0x1b, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="01634040030000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000400000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="580000c000000000003000000000000000200000000000000030dfffffff000000"]], 0xffffff73, 0x0, &(0x7f0000000680)="707e0ea3491af613ad9249ff747105b0ca94ee52c849e763a324289807eb4555c57d73f3275308e99e892123c9ff78706b5c0895a2e07469c7f5e7e9758a435e37c9f8cc45719234041dc0d777ee92c2bfbc21424c9517316d4f749fc144206fb447e602bf694e1bdccd4401956b4a9d1a545cec99e5745468d8f6634af63fa8fe0c68c4d8d27e6662c386e620155761d1e3a57d17040fc9eb614a43da7df29705ef4bd382b4f087072f41cce8a76a471f89e0af9c14fe33b535cda8b53c6caddd7a6882a5560ebecc1d9c894a1f0df3399b3bf2af0fb46cab660000"}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0xffffffa6) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x268, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) [ 569.949811][T28095] XFS (loop3): Invalid superblock magic number 19:25:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'3! ', './file0'}, 0xb) 19:25:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x36010000, 0x0, 0x0, 0x0, 0x0) 19:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x400}, 0x2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0xc52f}, 0x4) r1 = socket$inet6(0xa, 0x4, 0x10004) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r2, 0x10, 0x0, @in6={0xa, 0x4e22, 0x56, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}}, 0xa0) ioctl$RTC_AIE_OFF(r0, 0x7002) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000000c0)={@loopback, @local}, &(0x7f0000000100)=0x8) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 570.571806][T28412] XFS (loop1): Invalid superblock magic number 19:25:28 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000ac0)={0x2, 0x0, 0x2080, {0x5000, 0x107002, 0x1}, [], "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", "99e67d71a5cc61cc1ce3f1195a785f96289ffe4c960d6cc6dd25c53a96b3361c3d54bca0089ba49d9de9b9ca1299ebd9b4758f61d4c917ba6d2e5466e4cca3aca83b9d3677d356cdff7d3d62e13fd5172e62313ca0f583d4150e4d51c75dddfc5eea065c46ac7eef22fcc88c0dd7b60ba365be4d088ac58411e0a2f889df1d5aba9e15a6f5bb833145f27d8b7315a27d02d7d8d42e0b2e7c9e6bde64568610b21cd229e7e7660a2bedd172ee0687d5b9cafcde82b08aafd472f06eb9d129c5500b93ae392db6a41df125634ad24fb9433b5df3d60e06bb81c8fa5c6924d733857543cc08be8d0001a482954698aea58aba8d685a41c108574ae5dbf23016848454d90dda01f46976864c99bc58948f2b85a662d5551032fdb59ade566ac07b75271eaa2207abd2262c2686a2b35b8f659962e5f2abeec76c6390b6ed9e281519eaa0a2ed4e498440c27bb18485894efecb76d2a85fde433fb4920cef56113de13b5e818c9ab02c532272ff65d98192990bb22426f47c996e55d20de6472dd0c2cf72c987d75eeabb1ae12ac531df12503160fb818e992a86a36ba57eacc36761e7db98ab6ad59d54d19233026214e1d92804eab1d6a43d9776c4aa4527bed2c38d821b102f7e08919c88bb21f2d25e0bf4625599dd84a1b552c23c919ef357d02e2e9a9f35a96f923cf27862e0acebe7d886850ce115d3be582239dc1985a6babac9c3031038d0e5a799d57a19523edec7ce53a7f9b1b65d002508318c2cfc9ee83b9f5a4a644d31bdac4fa376c1218bfe72699c8b211a6f2bcb4b92286dc43f735a22d3db7fd091520bb2929736b9ceb5561161fdedbf4bd184c4c39856bae7e548e77874c0ab5f22a6ab6768b6a8658139aa179906770a78e8ac9518109dcfedc7522dc1981936580e9c1f80320785375fd39e51ee1858ea6e470f92d58bba8bce977255e4662903e0ce86bd82da95c4191739a1eeaab3631ee3fb603f103fc42e61315d549360943e50b71cddc975284bd0249bf5031a713e8044010f2c19a90a084b5561b6e7a7cf4dafa6417159a80602c8ab64250dfd1a56cee9f15e08ba026d6d72ec41c090ca104063ee3f70b7994c748ebf0d43d51652a6a3dfa249717607815d9ecfa8836470da81456f37fbdb12ae6105e6152b1916747baa4797cecb7b28298c23bef2c112e340cdf87ecddcb46394e3d61b762dfde2a81bbb0ea8c3311356666446986a411d582882408e471e3d88a7be61fa00fd1627e42bcf832b5cb1c36c2da330ff8b60f0a8753732d3bafe1c89057dc70efb3b47964bf125d94c22e7d52edbd39cf2cd99e0d456315d76f65198231bbc10d02497fb6316f445a5b2e9ce41cc256284bd7cf2d81bf2e95555adf6c3e832a12598e4eda099e7f2d3a78286b11dfb9b03b22413605e79a58b96e47fe759534c4ef9730ea3583540b26d9d48b8f7a0311cb8e2cbcb860ca5b34411b084b8853a1038fe35b2ccf3d2a97cf29750a9cc9037457902ea96abc70fe506ff53216abff50fced8169d65957a4757d0972207a37bf7206791201e54d75c3dfc4a7ce02c9d2c69e688b34890dfc49c65c97eb44ca81634e7fa82dcfb6b2ac50dc4646ca09cce4954c66a7b2da168a1d6d87b0e4aa473d7496f2a41edc7e8d3dddc586f7c92b3ceb4e8e89154a7957ded1a578879a0927201650148373b4910a7210060985f8b2454c8b99f18d5ebb7fdf845c2677738db4060e5509f5d3fb961d8bab5d1f79dcd1ac2c6e3441717eec72d1bf7cfc1a6cbeb72d7f8bb9024969bde9b8c43ab9688afceeb2d1017e07b4ba9ea3a21d30c7b4ea367724d79535b48fb1b16832c7cf7f30a8fb56ed61099a51019f7d5f22d16c8abdb18c3f74571f6b1c2e74dd53854a61b94a1b4126446bce6fbf1b86f9c503f31bfa4685d25ab7dde953c5e7265e87f6f4b228cc24a497fbdda47f16c011ba857404c95046e84a9a89f9407f24bf5d7306bf8e47dc8c994b547c9dd7b1d13b98bc1468edc026e87ec039424be1f1d1ee13ef5bc15f174f79cce1a815fd381c633b5c546b73b7954099185855c49ae2d100dc4794a92af74edb96aa1b6b7b3a6945600bd565e92755ef246bf7e9f1c060fe411ac5120ace60409ba4032e8464252f49a9d4333a0f344f529f20a093c17dd98b145dd78fac576b2377e1144775c06ff48a30769799e6766fa0a466b07df6498ac18ff63219d15207d9a41a86fd00efc790bc384075c8e43ba1d6ed71ab66193cdec6b79cc2214ac5debfffa4cb50495392c4af7e42d1639483fb1e3aaf39867ff56d5fb6e63747ec658165530b3057cf1d5d0d4face37421557296a37cd754b13f611f705d5537430cc4c6c4ee06edb3308c983c81db62007beec49f52a56f157c0d534d306a9f4a7101bdf86af3e0092cc1953edbf737cfab8adc8ba0a797b46a50b53a042d2bddd2d9c9130a9b0ec082fa4109f74d95a5a076f000c7a111084a226f8356af06d3ceb3355e98b3151d2d99424fe883f74854cf3019c2e2be4484133c021bb4acd6ec9857d0ba11825cfed8fee1f1cc5d64b970a35983f15a5181e8fbf6671e42acd724321ab67c5b4370a57b9c4fa58caf275370ec33197f1419022b14c347785127bc339c38d8e5a4e5e110114aabea0f0098287a91aa031a6510dc5438e18515b1b4c2d314e5b0bb479aa3144697f8a02f2d50e483b43bbeac7e669790be72f1807844033e3a88e0f0a3b83eeb6973bc10604a1126a740f90466c0f3faf18a7d8765b3d8927e9fa5ab5e680b1b29be6521975045ef6fb618c551663d3aa9abb6e67bac871114ac5104b138ffd49e167c5d07992696014a9d085f86da454bba237d52483b9973b579e60a5957f216e8591fb0b5174cac9270de7ca081c9a5759f5e51f75c7cfe4f02a007cad152a4cd053cb1334ab1baedd9e1a7f3f620dd52f77014fbddc2d9616636e7d2135c5642ae94b115f28bb4cd661882a039fc903120a255d7d501526318f84c4c3a4902aa0781d840050a025409f2cd70bc68a5df61f014df9e4af19e9d5adba8664aaf4125ca287530d96e60823b3dccbce598afd25439b45de5638bcc6ad4cedc5084fa24c86de9ff69576767a7b8307a60363f527c100515616ffae3cda3d513c56e860e78a5a0530228ee9512fb055e42630613f686ea6b86472ec375d2911310becaf1398d1f196e65d5dbb2242186450bd1233123dc773d83c47b19a08c18a5a75c361231e1aae108992187394799b29151596addb9200b3ca5cf4273bb7c790175212a3add97f414b2a9635531df0e8e82afdf05c43dd5b08b70d432a1fb33c683037e7025b38ed3d1bb88a66b28c2532a1161ca1faeb5a0c1eaff5ad298cdf3d895efe26faac7cfa6e72c345e57eef5e986afd9b8fa168c5f52d2e1af6278b60a88d2936e638f9553207646d20f848d4c2849fc433bbd24b1e127a6ca1c526237c725d515f777648794ce95f98223d8d621d10bfa22d85efc5d58b7c97b264a353fea948a96bf648a5ff4aa080df55a7447c33b88b538c2d4362fb60f5be63b133541477b6e1fb1f5cb41dc7a31d183a05b798d805d53f746d67f7a531cefc8b7e1838b34f31e8e8cc8d1ea94870a2024d3abc60a842970be347fff4462b3710672f0bb23988fb1457b10b8a0f62614b85b9cc6c1eebc9075c76a9c55066d24fadfb7682c6a4f205d93d06b0cf746edf9f055b6bbcf37344db7c5d1fe6d3fbabc49c216e16c5b5821a067afec9c3e439336e7e73eeca906d246eef715b0fcbbfb1647e3146ab50466410ac6d7d04fdbbd8aadce71214cf0fb8a18586a2e65c73be0e96ffedee07a9ada63d7e0c6ac9392ea1d0daa2749da7d8fe10ac04294cde0580a2100f4252c58ff2ac9743210f5ac3544ca22c5985e01d53b9d0052bd46703e60487c5223a9450f73fc62f4e4961d676ef5a560d19b7e609000b8dab6cba868b9637cf9a4cb5eee8eaff4c3431f1b23f188a0a66319624a7cb70e69f5903ead794c291cad1815c13f854d96c5c984fd09db16a9dfae84bb4db1cbc1a4f115e1e8bbe03054926c27fb9c22aa124e483bf383ef59ee139b77346c73a2ae93240c3247619cd7c065c4f10d6bb10e911417277b36ec9901276424232c559db374bd61c57f22f15bb035ac20d6143f7f6bda2c1c20fa2b30754a73acc21ba6c2df3c0ad381f0051eac843073713c818fd8adbb091ea48fa2659a254660beca853972cc7ca871f6f0b1a9b44f62af387e548031b32b2780848f2be0da2bfcf82b8e8ec8a33db26aeb8e882c1dac94d0096eca3ab3742976e58a6ca64e18c5672c5d333c84ed1cc559304cf69982eca39ced8974a3864558a128a7a6482b1b1d885f05b88c1f501aed7956e484c503b479d801e8f20161ef714e45874ed133d1d8fec6447549365bd569c697c7e3ad55454c8f6f790934279b68eba24ea91262ca3fcbc73876fde86aec7d51d8f38dd2c366cfd24ccb8b1d8604e5b445702f22051404d24b13c6adee7c481cc519427a460f018433b43bb367231ac1f12743393a5f13424876601a78d455a580a408f990b334e2b692b93442d672663ee0b0e73dc9aab49c656a0ca152dd3a01d29ef25dbc115a0b594188c947a0a0ca006f6b3394ac63561de02be6c589f2c8aa7bd8a5b63c5d49d47aa3667596d0863c025c1bea583a298254a401bffe449704c568fa167a30e6bc36e732e92157c6dc17aa83f4e7ba75a7ab71a1a043712a8a4c10c9bd93dfeb51a7be1cc2b4f3f4d7824a34a8384a5554250b2470b241fa43c5c9ef406dcbe9d62ac1da3609c750929a68fdbdf5e2ec62be0f7689e78b9711fc218dfe214467deea074ab569346032e91e1170e00c0b6968932357446b01dc35e8b6f21deff8f4e36532a9b9f9e896be338037f7cd646408ce2f9f1eb6e49b4981817652a721a25483b5e008b22933429c1dacf57c54436a899a17d78fd1efef420b54f125fb88fe6b240576f056676042771b2de6d92e5a9d48fee3c176ee3feec71db0b894403910a1214936b4d4413ea7d1b10fdf39d9995feaa61a41c2bd9234b9a55148de0207099be534a545cf4a927ce2e6d968a327a8ec9d70ba6604960f14269ae59d282000dd811dad1772779f4886470d9dbc934c94eec2a089b78bb90ee2fbbe7edb1a959126f05acfaaf227127ce2b8f6ab8402173c935a3d4637568722a97931bb5f282e203fa6a22f748083b6bd63c7e9c780a1a9fdf963f752e62359e20d6d48e9e168de834c35ae1ee78d3693393f40c8def93171ed85ec03801fa760d6a88b94270b316d5ff70e13b14d3d8b2e1f8acf703341e1a5a7161602ed7f3247ef50e09e8fdc1cfff111f45600373c39c236dce77c224c1998e1b651789f519b14e1b1c053c0e4f8ca277a3dda50092ef46aa1f4f6d6c9dacddde1f1ecc47792986e2c6fc250e4faf2b9fb6bdf7e31b6b2daa369e6d5f70734482cf6b3d6ee401ae16c7f498d677119c1482aab878cb8c5b91ef58ac059c818e0182dcb95c02b88411308d36574feb2e5c37601390c7e1312ecca83d5be051028a5089153639eefddde6d236ef36f61e7ca2c4e41a85114b36cff6baf5ab9f2c2e9321453920f0b85f68a35a59ed57bbe3c0b2e7dbf3632787d5a93aad8c7120f8d5f4549107953f11afee8c0821487fee9b185f283d384a8021e1e96d87f4c288c01e291a56a0826d574e967a2149eb52786f2e98a9bb0828447d2eaddf925e9c8e673e030312d276976a1661ad2c7dc61fe5945f3c593d31150df1"}) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r0, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2e0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) [ 570.800892][T28458] XFS (loop3): Invalid superblock magic number 19:25:29 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000580)={0x7fff, 0x0, 0xfb, 0x405}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f00000003c0), &(0x7f0000000400)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = accept(r0, &(0x7f0000000080)=@generic, &(0x7f0000000000)=0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x80c0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) 19:25:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) 19:25:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x5, {0x1}}, 0x18) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 19:25:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:29 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000700)='./file0\x00', 0x0, 0x10) setsockopt$inet6_int(r2, 0x29, 0xcb, &(0x7f0000000740)=0x4, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r3, r3}, &(0x7f00000009c0)=""/240, 0xfffffffffffffe2a, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x7) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000580)="5505cf569caa52e0eb8d0d72c5e7786bf38249ab01c9ab82a5b631af445a0f88865eb541bdcf1e66a404eb1852e195797f9eecb74f9f511910dbeeda737bc451a8d1b5281da801a2c88afb", 0x4b, 0x0) [ 571.580000][T28613] XFS (loop1): Invalid superblock magic number 19:25:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2fa, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:30 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) r4 = getuid() r5 = getgid() keyctl$chown(0x4, r2, r4, r5) 19:25:30 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0xaba0dc5327c1c6bd) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) timer_create(0x5, &(0x7f0000000980)={0x0, 0x1d, 0x1, @thr={&(0x7f0000000840)="1bb8603fd5c4aba5fb288c5518a90258372ee4d780dbfb52ea5b7ca5c536af8a6e0f5ffb891a23c317dcb4bc9980fad6798d1d8561a061bc6e427a006a85835d91a1715a9acf78a30dde7215b1f7055b8b58168b2ee97080dff6517be62b3ec54ea7af547461b398629a8e6631fd809f9eb3ca7b63bb3221df671bc83c35", &(0x7f00000008c0)="090086abcfa4e76e94c627bfb11ec6673a825a34e38ed98daf5c518697d76c74a6f436d808c390830201c19097bae3fcaca887f849e033e7cd9c1f9d52d3663c52c1b249a9fb9bb28d49a7aafb5d5c2e562d639e43b72dad3f4de2c665e60769bad87af6d39c4704e9154a54563cf106b4e09928ae5096101efef2c7504939456e0e56a879e3a20af7d40d9777f92c6b"}}, &(0x7f0000000ac0)=0x0) timer_getoverrun(r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-monitor\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x30, r4, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x20, @bearer=@udp='udp:syz2\x00'}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000340)={'syz'}, &(0x7f00000003c0)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r0, r5}, &(0x7f00000009c0)=""/240, 0xf0, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f0000000540)=""/218) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/capi/capi20\x00', 0x101000, 0x0) 19:25:30 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r2, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x91}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffbf}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000040}, 0x10) 19:25:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:25:30 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x6, 0x220101) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000880)={'teql0\x00', 0xc510}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x200000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000700)={0x1, 0x0, {0x8, 0x7ff, 0x3002, 0x0, 0x9, 0x0, 0x1, 0x6}}) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) write$UHID_INPUT2(r2, &(0x7f00000008c0)={0xc, 0x6, "7cbb15e4b5fb"}, 0xc) r4 = request_key(&(0x7f00000007c0)='id_resolver\x00', &(0x7f0000000800)={'syz', 0x2}, &(0x7f0000000840)='IPVS\x00', 0xfffffffffffffff8) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000780)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182307ce318efbeb25730216f1b5e2d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138dce6f3d0400000000", 0x1e5, r4) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r0, r5}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x40) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)={0x4c, r7, 0x110, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xbd3c}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x2}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x11}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200b80, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x9, 0x3, 0xeec}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="32210a3ce1c42b324d8b2169e06bbcda78acace4de5de12a365151aa4df50dbf53a627e2314832e84f216c77be3a5f931c6f3dc0ed7121fcf34464756d6de590f1e6e6ae619f0dfbd4c833e5290aae"], 0x3138) [ 572.015312][T28738] XFS (loop3): Invalid superblock magic number 19:25:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) 19:25:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:30 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) r2 = request_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000880)={'syz', 0x0}, &(0x7f00000008c0)='mime_type\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r4 = syz_open_dev$audion(&(0x7f0000000680)='/dev/audio#\x00', 0x0, 0x1000080) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r4, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)=r5, 0x4) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xf}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000700)={r6, @in={{0x2, 0x4e22, @remote}}}, 0x84) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f00000005c0)=0x4f, 0x4) [ 572.391292][T28978] XFS (loop1): Invalid superblock magic number 19:25:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40000, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'3! ', './file0', [], 0xa, "9d3007000080000000000866040000004f2ebfec75deb12a995d97000000"}, 0x29) [ 572.924528][T29077] XFS (loop3): Invalid superblock magic number 19:25:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0', [], 0x9}, 0x3138) 19:25:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) 19:25:31 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x240000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x80000001, 0x7, 0x4, 0x8, 0x0, 0x9, 0x2400, 0x0, 0x80, 0x7fffffff, 0x3, 0x200000000000000, 0x1000, 0x5, 0x0, 0x3, 0x20, 0x100000001, 0x9, 0x5, 0x590, 0x7, 0x1, 0xc4a, 0x7ce, 0x0, 0x0, 0xb4, 0xc0, 0xef, 0x3, 0x10000, 0x100, 0x7, 0x7, 0x100000000, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x20, 0xfffffffffffffffe, 0x3e, 0xf, 0x62dc, 0xffffffff, 0x1}, r0, 0x4, r1, 0x2) r2 = perf_event_open(&(0x7f000001d000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x927d, 0x16654000, 0x8, 0x4, 0xa0000000000000, 0x2, 0x6, 0xe1, 0x100, 0x40, 0x3b8, 0x3, 0x81, 0x38, 0x2, 0xb1, 0x20, 0x94d}, [{0x3, 0x6, 0x2, 0x1, 0x4, 0x100000001, 0x5, 0x1}, {0x6, 0x10000, 0x0, 0x100000001, 0x2, 0x6, 0x0, 0x2}], "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", [[], [], [], [], [], []]}, 0x7ad) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) tee(r1, r1, 0x4, 0x1) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000240)={0x3f, 0x9, 0x8, 'queue1\x00', 0x8}) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r2, 0x0, 0x8, 0x8, 0x7fffffff}) ioctl$SIOCRSGL2CALL(r4, 0x89e5, &(0x7f0000000080)=@default) write$binfmt_script(r3, &(0x7f0000002ec0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3138) 19:25:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x40010000, 0x0, 0x0, 0x0, 0x0) 19:25:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3!1', './file0'}, 0x3138) 19:25:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r2 = msgget$private(0x0, 0x380) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000140)=""/133) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="3321202e2f66696c776ce05bd8aa489c1bc38c115c2b718a13f5c5d87918a97cb2ce91927169f9f421ca7772582baa3718a21c42b6fea020733e5020de92266898268e097054d27820839bf504d3ade5f2cec7a79f2215a53f2553cadc8e4f302580425d28df6f99a4909b5c96fa2b7d3eb6e1ec8bbf6a7571b1f94a81c5183cc33aa0cd60231a96219f8196e8a939826feea0cb4bec172fcc79b8ed77fd98f17cd7e7c4cc23ccefb9557de3eaae9065db52000000"], 0x3138) 19:25:31 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x252, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x2) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000400)={0x28, 0x2, 0x0, {0x0, 0x0, 0x6}}, 0x28) 19:25:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:31 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x100) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x442}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)={0x9c, r2, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x53f8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x1) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r0, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r5 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 573.404480][T29239] XFS (loop1): Invalid superblock magic number 19:25:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x368, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) 19:25:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @remote, 0x9}, 0xfffffffffffffe1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) [ 573.904917][T29381] XFS (loop3): Invalid superblock magic number 19:25:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") mount(&(0x7f0000000040)=@nullb='#\n\n:d]:.m[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x42534658, 0x0, 0x0, 0x0, 0x0) 19:25:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:32 executing program 0: r0 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x3, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xe49}}, [0x5, 0x9, 0x3f, 0xfffffffffffffa7f, 0x0, 0xffff, 0x9, 0x101, 0xfff, 0x2, 0x10000, 0x475a, 0x6, 0x400]}, &(0x7f0000000780)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000007c0)={r1, 0x48da, 0x40}, &(0x7f0000000800)=0x8) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, &(0x7f0000000580)=@chain={'key_or_keyring:', r2, ':chain\x00'}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r2, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) write$binfmt_elf64(r3, &(0x7f0000000ac0)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffffffffffe1, 0x5, 0x9, 0x1000, 0x101, 0x3, 0x6, 0xef9, 0x264, 0x40, 0x157, 0x80, 0xfffffffffffff000, 0x38, 0x1, 0x0, 0xffffffff, 0x62a}, [{0x7, 0x4, 0x9c5d, 0x3, 0x3, 0x2, 0xfff, 0x2}, {0x70000000, 0x4, 0xfff, 0x7, 0x4, 0x1, 0x8, 0x20}], "650721b6a08afea9c49c4d429cc283d2b474fa2044690d43fe69102fbe47ac966dfcdc5e92f49ccd7676a6ad4077492c543428f336ad6b5ccec27572d79cd2a39948cec699c0c577456d51187d3538b61f804a743da89bd0a458c3d280e149f863132f66025d5d355f6a36ec1c1eaecf9ed698495c8481dd1a34e984f4785428bebffde655eed7cceb668933430422c79ec314b7357445f69ed9781dd4c4802b0d407248269c588886ff4782428074f912cc7f873a9107c6"}, 0x168) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) recvfrom$rxrpc(r4, &(0x7f00000003c0)=""/98, 0x62, 0x10000, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r2, r5}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000900)={0x7c, 0x9, 0x4, 'queue0\x00', 0xc}) 19:25:32 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fstat(r3, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x820000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x1ff}}, {@mode={'mode', 0x3d, 0x1ff}}], [{@subj_role={'subj_role', 0x3d, '^'}}, {@uid_eq={'uid', 0x3d, r4}}, {@measure='measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x64, 0x36, 0x33, 0x75, 0x75, 0x34, 0x32], 0x2d, [0x34, 0x64, 0x39, 0x38], 0x2d, [0x32, 0x0, 0x36, 0x34], 0x2d, [0x61, 0x7f, 0x77, 0x66], 0x2d, [0x31, 0x3b, 0x37, 0x77, 0x61, 0x34, 0x38, 0x3b]}}}, {@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'queue0\x00'}}]}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x7, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) [ 574.475593][T29613] XFS (loop1): Invalid superblock magic number 19:25:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x36e, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 574.634379][T29613] BUG: MAX_STACK_TRACE_ENTRIES too low! [ 574.639996][T29613] turning off the locking correctness validator. [ 574.646341][T29613] CPU: 0 PID: 29613 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #37 [ 574.654356][T29613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.655338][T29744] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 574.664405][T29613] Call Trace: [ 574.664433][T29613] dump_stack+0x172/0x1f0 [ 574.664449][T29613] save_trace.cold+0x14/0x19 [ 574.664459][T29613] mark_lock+0x2fb/0x1380 [ 574.664470][T29613] ? print_shortest_lock_dependencies+0x90/0x90 [ 574.664481][T29613] __lock_acquire+0x1317/0x3fb0 [ 574.664495][T29613] ? debug_object_activate+0x206/0x4f0 [ 574.664507][T29613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 574.664521][T29613] ? mark_held_locks+0xf0/0xf0 [ 574.664532][T29613] ? debug_smp_processor_id+0x3c/0x280 [ 574.664544][T29613] ? perf_trace_lock+0xeb/0x510 [ 574.664555][T29613] lock_acquire+0x16f/0x3f0 [ 574.664672][T29613] ? flush_workqueue+0xf7/0x14c0 [ 574.664692][T29613] flush_workqueue+0x126/0x14c0 [ 574.685757][T29744] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 574.688288][T29613] ? flush_workqueue+0xf7/0x14c0 [ 574.688308][T29613] ? lockdep_hardirqs_on+0x418/0x5d0 [ 574.755964][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 574.760602][T29613] ? lock_downgrade+0x880/0x880 [ 574.760618][T29613] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 574.760636][T29613] ? __call_rcu.constprop.0+0x2a3/0x6c0 [ 574.760649][T29613] drain_workqueue+0x1b4/0x470 [ 574.760661][T29613] ? drain_workqueue+0x1b4/0x470 [ 574.760674][T29613] destroy_workqueue+0x21/0x700 [ 574.760783][T29613] xfs_destroy_mount_workqueues+0x97/0x1c0 [ 574.776903][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 574.778494][T29613] xfs_fs_fill_super+0x8e9/0x1670 [ 574.778513][T29613] mount_bdev+0x307/0x3c0 [ 574.812326][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env 19:25:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x400) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x2a}, 0x9}, {0xa, 0x4e21, 0x3, @remote, 0x6b}, r2, 0x20}}, 0x48) [ 574.814496][T29613] ? xfs_test_remount_options+0x90/0x90 [ 574.814510][T29613] xfs_fs_mount+0x35/0x40 [ 574.814528][T29613] ? xfs_finish_flags+0x490/0x490 [ 574.828186][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 574.831029][T29613] legacy_get_tree+0xf2/0x200 [ 574.831057][T29613] vfs_get_tree+0x123/0x450 [ 574.865377][T29613] do_mount+0x1436/0x2c40 [ 574.869711][T29613] ? copy_mount_string+0x40/0x40 [ 574.874663][T29613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 574.880910][T29613] ? copy_mount_options+0x280/0x3a0 [ 574.886110][T29613] ksys_mount+0xdb/0x150 [ 574.890362][T29613] __x64_sys_mount+0xbe/0x150 [ 574.895059][T29613] do_syscall_64+0x103/0x610 [ 574.899658][T29613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 574.905552][T29613] RIP: 0033:0x45ac7a [ 574.909449][T29613] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 19:25:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 574.929064][T29613] RSP: 002b:00007fd3fbf7fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 574.937662][T29613] RAX: ffffffffffffffda RBX: 00007fd3fbf7fb40 RCX: 000000000045ac7a [ 574.945649][T29613] RDX: 00007fd3fbf7fae0 RSI: 00000000200000c0 RDI: 00007fd3fbf7fb00 [ 574.953630][T29613] RBP: 0000000000000000 R08: 00007fd3fbf7fb40 R09: 00007fd3fbf7fae0 [ 574.961605][T29613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 574.969585][T29613] R13: 00000000004c6b80 R14: 00000000004dc190 R15: 00000000ffffffff 19:25:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 574.974487][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 574.998997][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 575.025359][T29744] XFS (loop3): Invalid superblock magic number [ 575.103556][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 575.111419][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 575.127895][ T3876] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 575.135530][ T3876] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 575.178240][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 575.185551][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 575.249775][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 575.257711][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' 19:25:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) 19:25:33 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000340)) 19:25:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x80084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'3! ', './file0', [{0x20, '3! '}, {0x20, 'self.eth1vboxnet0:%@'}, {0x20, '3! '}, {0x20, 'ppp1\'ppp0selinuxcgroupselinux'}, {0x20, 'usercgroup'}, {0x20, '\x17! '}]}, 0x55) 19:25:33 executing program 0: r0 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x3, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xe49}}, [0x5, 0x9, 0x3f, 0xfffffffffffffa7f, 0x0, 0xffff, 0x9, 0x101, 0xfff, 0x2, 0x10000, 0x475a, 0x6, 0x400]}, &(0x7f0000000780)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000007c0)={r1, 0x48da, 0x40}, &(0x7f0000000800)=0x8) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, &(0x7f0000000580)=@chain={'key_or_keyring:', r2, ':chain\x00'}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r2, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) write$binfmt_elf64(r3, &(0x7f0000000ac0)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffffffffffe1, 0x5, 0x9, 0x1000, 0x101, 0x3, 0x6, 0xef9, 0x264, 0x40, 0x157, 0x80, 0xfffffffffffff000, 0x38, 0x1, 0x0, 0xffffffff, 0x62a}, [{0x7, 0x4, 0x9c5d, 0x3, 0x3, 0x2, 0xfff, 0x2}, {0x70000000, 0x4, 0xfff, 0x7, 0x4, 0x1, 0x8, 0x20}], "650721b6a08afea9c49c4d429cc283d2b474fa2044690d43fe69102fbe47ac966dfcdc5e92f49ccd7676a6ad4077492c543428f336ad6b5ccec27572d79cd2a39948cec699c0c577456d51187d3538b61f804a743da89bd0a458c3d280e149f863132f66025d5d355f6a36ec1c1eaecf9ed698495c8481dd1a34e984f4785428bebffde655eed7cceb668933430422c79ec314b7357445f69ed9781dd4c4802b0d407248269c588886ff4782428074f912cc7f873a9107c6"}, 0x168) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) recvfrom$rxrpc(r4, &(0x7f00000003c0)=""/98, 0x62, 0x10000, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r2, r5}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000900)={0x7c, 0x9, 0x4, 'queue0\x00', 0xc}) [ 575.310455][T29613] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 575.317666][T29613] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 575.359461][ T3876] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 575.378724][ T3876] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 575.434097][T29744] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 575.443004][T29744] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 575.469887][T29983] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 575.484991][T29983] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 575.515526][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env 19:25:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xa403, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x380, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) [ 575.554290][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 575.573268][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env 19:25:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 575.598064][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 575.619630][ T3876] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 575.632067][T30101] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 575.639402][ T3876] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 575.652965][T30101] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 575.666161][T29983] XFS (loop1): Invalid superblock magic number 19:25:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x4, 0x5036) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xfffffffffffffffc, 0x1f, @remote, 0x9}, 0xffffffffffffffd4) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321006b8b88e900000000"], 0x3138) 19:25:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 575.765001][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 575.777147][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 575.782398][T30101] XFS (loop3): Invalid superblock magic number 19:25:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) [ 575.810899][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 575.833608][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 575.888713][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 575.905351][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 575.941843][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 575.949002][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 576.002196][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 576.009711][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 576.081309][T29983] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 576.088560][T29983] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 576.101527][ T3876] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 576.113510][T30333] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 576.114144][ T3876] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 576.122845][T30333] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) 19:25:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r0, 0x0, 0x11, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r2, 0x8, 0x9) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="4cb50d11b9362465846221d839a97830e6b01ac705e4009ae1c8cc510a1139e1042e8b5420a1669ee5ee07ebba844d3ac54e950ee201b9425da2efb7b532d3f44d9450d60e266ebaab16c2836888f9"], 0x3138) 19:25:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:34 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) rt_sigtimedwait(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000580), 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vsock\x00', 0x12001, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000980)=0x1000, 0x4) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:34 executing program 0: r0 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x3, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xe49}}, [0x5, 0x9, 0x3f, 0xfffffffffffffa7f, 0x0, 0xffff, 0x9, 0x101, 0xfff, 0x2, 0x10000, 0x475a, 0x6, 0x400]}, &(0x7f0000000780)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000007c0)={r1, 0x48da, 0x40}, &(0x7f0000000800)=0x8) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, &(0x7f0000000580)=@chain={'key_or_keyring:', r2, ':chain\x00'}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r2, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) write$binfmt_elf64(r3, &(0x7f0000000ac0)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffffffffffe1, 0x5, 0x9, 0x1000, 0x101, 0x3, 0x6, 0xef9, 0x264, 0x40, 0x157, 0x80, 0xfffffffffffff000, 0x38, 0x1, 0x0, 0xffffffff, 0x62a}, [{0x7, 0x4, 0x9c5d, 0x3, 0x3, 0x2, 0xfff, 0x2}, {0x70000000, 0x4, 0xfff, 0x7, 0x4, 0x1, 0x8, 0x20}], "650721b6a08afea9c49c4d429cc283d2b474fa2044690d43fe69102fbe47ac966dfcdc5e92f49ccd7676a6ad4077492c543428f336ad6b5ccec27572d79cd2a39948cec699c0c577456d51187d3538b61f804a743da89bd0a458c3d280e149f863132f66025d5d355f6a36ec1c1eaecf9ed698495c8481dd1a34e984f4785428bebffde655eed7cceb668933430422c79ec314b7357445f69ed9781dd4c4802b0d407248269c588886ff4782428074f912cc7f873a9107c6"}, 0x168) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) recvfrom$rxrpc(r4, &(0x7f00000003c0)=""/98, 0x62, 0x10000, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r2, r5}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r6, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000900)={0x7c, 0x9, 0x4, 'queue0\x00', 0xc}) [ 576.180513][T30101] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 576.187782][T30101] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 576.211451][T30337] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 576.218630][T30337] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 576.277227][T30337] XFS (loop3): Invalid superblock magic number [ 576.290379][T30355] QAT: Invalid ioctl [ 576.302879][ T7650] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 576.311303][ T7650] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0xc0880, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3321202e2f2320c4bfa3cff9085f7266696c65300a"], 0x3138) [ 576.339149][ T3876] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 576.369990][ T3876] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 576.380722][T30460] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 576.388195][T30460] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 576.409248][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 576.447718][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 576.490639][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 576.510386][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 576.530487][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 576.538950][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 576.554680][T30460] XFS (loop1): Invalid superblock magic number 19:25:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3a0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x1ff, 0x1, 0x7, 0x5, 0x7f8, 0xfffffffffffffff7}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:34 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) r4 = gettid() syz_open_procfs(r4, &(0x7f0000000340)='net/ptype\x00') ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 576.730411][ T7655] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 576.739812][ T7655] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 576.770639][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 576.777801][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 576.842314][T30690] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 576.858327][T30690] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 576.934731][T30460] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 576.950263][T30460] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 576.982293][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 576.989459][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 577.019414][T30698] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 577.028793][T30698] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 577.078574][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 577.089057][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 577.090631][T30690] XFS (loop3): Invalid superblock magic number 19:25:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x105001, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x11c, r2, 0x206, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1f}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x81}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdc}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x14}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x52}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) write$P9_RCREATE(r1, &(0x7f0000000340)={0x18, 0x73, 0x2, {{0x20, 0x3, 0x5}, 0x7}}, 0x18) write$binfmt_script(r0, &(0x7f0000000100)={'3! ', './file0', [{0x20, '3! '}, {0x20, '3! '}], 0xa, "75c0c4feaec1583147e512182791606626b4b7f8fe8008cdab2fe157e52bc4d0b833d7ec801ce263384308384d1fb8dc488268d5acb9546461c7a94458f5b3e3963ccd5362b3fad87d61815fa6a8cffee20abad7b7c100bfa0d54e7fef5fe62f28beb9acb6d6b3"}, 0x7a) 19:25:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0P\x00', 0x4, "8d2b3136"}, 0x0) 19:25:35 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff3b) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000400)=@assoc_value={0x0}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000680)={r4, @in={{0x2, 0x4e24, @remote}}, 0xfff, 0x394, 0x2, 0x6, 0x21}, &(0x7f00000005c0)=0x98) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000003c0)={0x4, 0x2, 0x1, r3}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) r5 = gettid() move_pages(r5, 0x6, &(0x7f0000000740)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil], &(0x7f0000000780)=[0x3f, 0x7f], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000340)=0x0) tgkill(r5, r6, 0x5) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4e000000, 0x0, 0x0, 0x0, 0x0) 19:25:35 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x73b}, 0x4) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)={0x131b}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 19:25:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0p\x00', 0x4, "8d2b3136"}, 0x0) [ 577.203453][T30716] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 577.222257][ T7650] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 577.229439][ T7650] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 577.250379][T30721] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 577.255936][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 577.276191][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:25:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000q\x00', 0x4, "8d2b3136"}, 0x0) [ 577.311618][T30788] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 577.327697][T30788] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 577.376047][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 577.391132][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 577.434943][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 577.457791][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 577.471942][T30690] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 577.472011][T30788] XFS (loop1): Invalid superblock magic number [ 577.485972][T30690] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 577.519551][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 577.537846][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 577.551843][T30845] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 577.559044][T30845] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 577.582334][ T3876] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 577.603762][ T3876] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3a2, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:35 executing program 2: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) 19:25:35 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x73b}, 0x4) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)={0x131b}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 19:25:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 577.705419][T30854] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 577.729907][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 577.759471][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 577.771204][ T7655] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 577.786621][ T7655] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:36 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x73b}, 0x4) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)={0x131b}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 19:25:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) [ 577.869671][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 577.879550][T30963] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 577.882559][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 577.902810][T30788] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 577.914593][T30788] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 577.959363][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 577.984572][T30969] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 578.003926][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 578.015101][T30969] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 578.034271][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env 19:25:36 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x200, 0x101800) ioctl$KDSETLED(r1, 0x4b32, 0x1f) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x3e7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'3! ', './file0'}, 0x1) 19:25:36 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x73b}, 0x4) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)={0x131b}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 19:25:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x58465342, 0x0, 0x0, 0x0, 0x0) [ 578.067086][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 578.085077][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 578.096955][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 578.140363][ T7650] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 578.148007][ T7650] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 578.172830][T31019] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 578.196893][T30973] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 578.220156][T30973] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.256984][T31086] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 578.268885][T31086] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 578.306196][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 578.313734][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 578.327400][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 578.334797][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 578.349660][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 578.364965][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 578.416946][T31086] XFS (loop1): Invalid superblock magic number [ 578.451042][T30973] XFS (loop3): Invalid superblock magic number [ 578.781308][T31086] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 578.791909][T31086] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 578.860735][T30973] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 578.868038][T30973] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.886518][T31116] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 578.896120][T31116] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 578.910633][T31118] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 578.917858][T31118] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.934587][ T3876] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 578.942016][ T3876] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3b0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) 19:25:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) rt_sigreturn() 19:25:37 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x8, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x5c030000, 0x0, 0x0, 0x0, 0x0) 19:25:37 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x73b}, 0x4) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)={0x131b}) 19:25:37 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x73b}, 0x4) [ 579.090660][ T7650] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 579.097951][ T7650] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 579.110532][T31133] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 19:25:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="332167a46b8ec220000066"], 0x3138) [ 579.200880][ T7655] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 579.208056][ T7655] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 579.233574][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 579.268335][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 579.279946][T31242] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 579.287623][T31242] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 579.292626][T31247] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 19:25:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 579.341896][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 579.351427][T31246] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 579.363003][T31246] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 579.374461][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:25:37 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") 19:25:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 579.404018][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 579.430748][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 579.463856][T31242] XFS (loop1): Invalid superblock magic number [ 579.471872][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 579.479342][T31269] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 579.512080][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 579.529935][T31246] XFS (loop3): Invalid superblock magic number [ 579.575774][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 579.584631][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 579.600019][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 579.609112][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 579.632950][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 579.649112][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 579.666130][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 579.673539][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 579.724691][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 579.736495][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 579.901346][T31242] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 579.908586][T31242] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 579.919758][ T3876] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 579.928857][ T3876] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 579.950939][T31246] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 579.958431][T31246] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 579.976184][T31390] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 579.983577][T31390] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 579.994439][T31389] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 580.003680][T31389] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x60000000, 0x0, 0x0, 0x0, 0x0) 19:25:38 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) 19:25:38 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000000c0)={0x7, 0x1, 'client1\x00', 0xffffffff80000004, "780f89fc43dc9b2c", "00c722df24a3c99b4e0b049e27398c8dbdbd52a389015e3b823673f6ac7f774b", 0x800, 0x6}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e23, @remote}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x3) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3d0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:38 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000dc0)="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", 0x1000000cc) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000003c0)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) chmod(&(0x7f0000000340)='./file0\x00', 0x4) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:38 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x8000, 0x1, 0x1}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:38 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x2, 0x0) [ 580.196200][T31407] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 580.208881][T31398] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 580.224716][T31398] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80600, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000140)={{0x7f, 0xfff}, 'port1\x00', 0xb, 0x140c52, 0x3ff, 0x5, 0x3, 0x80000001, 0x4a, 0x0, 0x7, 0x9989}) getpeername$unix(r1, &(0x7f0000000080), &(0x7f0000000100)=0x6e) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="2f02501f37864c9753dc99517df86db88008b3c4897229f72da5a6239b7fb7321799219439531b73", 0x28) [ 580.300921][ T7655] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 580.308161][ T7655] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 580.324851][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env 19:25:38 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 580.353298][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 580.363981][T31405] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 580.372174][T31405] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 580.398415][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env 19:25:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xef\xff\xff\xff\x7f\x00', 0x4, "8d2b3136"}, 0x0) [ 580.431013][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 580.433845][T31531] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 580.465288][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env 19:25:38 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 580.468330][T31531] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 580.494786][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 580.527987][T31405] XFS (loop1): Invalid superblock magic number [ 580.544611][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 580.566430][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 580.599114][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 580.615967][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 580.637424][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 580.646297][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 580.667691][T31531] XFS (loop3): Invalid superblock magic number [ 580.891480][T31405] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 580.898864][T31405] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 580.928167][T31663] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 580.939071][T31663] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 581.050452][T31531] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 581.061038][T31531] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 581.121323][T31668] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 581.132120][T31668] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 581.170382][ T7650] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 581.179649][ T7650] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3dc, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0xc000000000000000, @local, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:39 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:25:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) 19:25:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) 19:25:39 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000340)=0x3) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000ac0)=""/4096) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) 19:25:39 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:25:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q0\x00', 0x4, "8d2b3136"}, 0x0) [ 581.340823][ T7655] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 581.347999][ T7655] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 581.370708][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env 19:25:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) [ 581.381658][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 581.398482][T31679] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 581.425356][T31679] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:39 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 581.444128][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env 19:25:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xa0\x00', 0x4, "8d2b3136"}, 0x0) [ 581.486525][T31796] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 581.494665][T31796] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 581.509419][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:25:39 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 581.588545][T31679] XFS (loop1): Invalid superblock magic number [ 581.599046][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 581.635143][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 581.669105][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 581.677321][T31796] XFS (loop3): Invalid superblock magic number [ 581.695935][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 581.725724][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 581.739080][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 581.759732][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 581.767559][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 581.849721][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 581.863599][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 581.931607][T31679] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 581.943657][T31679] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 581.967943][T31929] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 581.975493][T31929] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 582.110444][T31796] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 582.117797][T31796] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3fc, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\xb0\x00', 0x4, "8d2b3136"}, 0x0) 19:25:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000160007031dfffd946fa2830800200a0009000300741d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 19:25:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="3321202eb5a132c67665ac0d8275824d25d37aac00807d2508eb3b03a88d4c26d44305dca3917f129ab1ba4d5dc44809dc148b1e7602083743d5801671f5af26309e68ba1a83ac7cbbbd7ddfe964683fd1ec717c0b3fba8f12600c4f592083c945cd06d171182e2e7b98f72856b119b2f739c1b3f13229"], 0x3138) 19:25:40 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000400)={r1, &(0x7f0000000680)="ad2ff6a12a069573a29b25be7d68089f1d26bf0a43d87bd75eef395ad8795253f1152c9bfac18aae516edd379b203ffd34d846a608ef17fb50e4cb5a79969ffc4fd1f88df9663ab196746bf9a19d29dd802442b6d0751f7988ff4d408d859b27bf0382134c5530b95a9ee36566c31a5a6a84f9207f7795e4f7d9b2575d5ff13a3ce056a1d23040b366abce8d90c0d9b439ab958673485189860382e0fb0063575942c514a1664855845a7bea92c2d635e04069e19c086c5987b8cb8599fc2c3942fad48fd9e014e7e7343aab218142", &(0x7f0000000580)=""/124}, 0x18) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000003c0)) setsockopt$inet_udp_int(r3, 0x11, 0xa, &(0x7f0000000340)=0x7, 0x4) 19:25:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) [ 582.210569][ T7650] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 582.217784][ T7650] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 582.229491][ T3876] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 582.248451][ T3876] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4, "8d2b3136"}, 0x0) [ 582.277390][T31941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 582.305228][ T3876] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env 19:25:40 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev, 0x6}, 0x1c) [ 582.353520][T31952] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 582.374910][ T3876] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 582.380289][T31952] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 582.404239][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 582.425904][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 582.426097][T31951] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env 19:25:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) 19:25:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000002c0)={{0x5000, 0xf000, 0xd, 0x606, 0xf6, 0x10001, 0xdcd6, 0x8, 0x81, 0x5, 0x0, 0x99f}, {0x11f000, 0x1000, 0x10, 0xa6f, 0xe0000, 0x400, 0x80, 0x1, 0xff, 0x51a94c0f, 0x81, 0x3}, {0x2, 0xf000, 0xf, 0x2, 0x7, 0x8000, 0x3, 0x2, 0x2, 0x5, 0x7ff, 0x1}, {0xd000, 0x1000, 0xc, 0x200, 0x1, 0x20, 0x2, 0x8, 0xfffffffffffffffe, 0x80000001, 0x5, 0x3b}, {0x100000, 0xf000, 0x0, 0xd0, 0x5, 0x3, 0x0, 0x75e, 0x5, 0x82a, 0x3, 0x6d}, {0x110000, 0xf000, 0x8, 0x3, 0x81, 0x3, 0x3, 0x1, 0xffff, 0x9}, {0x1d001, 0x0, 0xb, 0x991, 0xfff, 0x8, 0x3, 0x7, 0x7fffffff, 0x4, 0x5, 0x439e}, {0x7000, 0x1000, 0xf, 0x9, 0x6, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x4, 0xfffffffffffffffe}, {0x2000, 0x2002}, {0x0, 0xf000}, 0x40000, 0x0, 0x7004, 0x200400, 0x4, 0x2001, 0x4, [0x0, 0x1, 0x1]}) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$TCFLSH(r0, 0x540b, 0x9) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r2 = accept(r1, &(0x7f0000000080)=@l2, &(0x7f0000000000)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0xc2, @empty, 0x9}}, [0x4000000000000, 0x10001, 0x4, 0x4, 0x2, 0x8, 0x7, 0xffffffffffff1ed9, 0x6, 0xb52, 0xffffffffffffffff, 0x2, 0xa7e, 0x2, 0xfffffffffffffff9]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r3, 0x9}, 0x8) [ 582.491915][T31951] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 582.523076][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env 19:25:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') close(r0) [ 582.550769][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 582.590699][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env 19:25:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xef\xff\x00', 0x4, "8d2b3136"}, 0x0) [ 582.626252][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 582.669008][T31951] XFS (loop3): Invalid superblock magic number [ 582.670859][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 582.687165][T31952] XFS (loop1): Invalid superblock magic number [ 582.708159][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 582.776637][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 582.806163][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 582.830694][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 582.838062][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 583.080530][T31951] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 583.087887][T31951] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xff\xff\xff\xff\xff\x00', 0x4, "8d2b3136"}, 0x0) 19:25:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000001c0)={@remote, r1}, 0x14) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') close(r0) 19:25:41 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x404300, 0x0) connect$bt_rfcomm(r2, &(0x7f00000003c0)={0x1f, {0x8000, 0x6, 0x8, 0x80000001, 0x9, 0x10001}, 0x7}, 0xa) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) [ 583.165473][T31952] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 583.188243][T31952] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x72010000, 0x0, 0x0, 0x0, 0x0) 19:25:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 583.240032][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 583.254960][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 583.265500][T32209] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 583.293640][T32209] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:25:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') close(r0) 19:25:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x4, "8d2b3136"}, 0x0) [ 583.352150][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 583.364114][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 583.391141][T32250] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env 19:25:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000100)={r3, r4}) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 583.400099][T32250] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') close(r0) [ 583.447902][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 583.463686][T32209] XFS (loop3): Invalid superblock magic number [ 583.484130][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:25:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x4, "8d2b3136"}, 0x0) [ 583.522887][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 583.573390][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 583.585752][T32250] XFS (loop1): Invalid superblock magic number [ 583.627084][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 583.666186][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 583.708956][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 583.716714][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 583.787332][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env [ 583.796990][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 583.864046][T32209] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 583.871939][T32209] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 583.923933][T32451] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 583.942408][T32451] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 583.991399][T32250] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 584.002776][T32250] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@largeio='largeio'}]}) 19:25:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff`\x00', 0x4, "8d2b3136"}, 0x0) 19:25:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 19:25:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x7fc, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 19:25:42 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x2, 0x0, "b9d5a93ce598ef743fcc2aa1e20ee3cfba3680260ff2b78410bacb07b89d83045bb874f36907c121f724763b475333b4019a1cecfef4e13e2ff84df013def166e59dbe5aeeb0a4de41cf0012897bb4c3"}, 0x2f6) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x80) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x220300) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000001c0)={0x8000, 0x4, 0xff}) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000100)={0x7c, 0x9, 0x4, 'queue0\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685) [ 584.103164][T32457] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 584.130366][T32457] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 584.230392][ T7655] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 584.237573][ T7655] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 584.257875][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 584.269182][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 584.307316][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 584.331309][T32573] kobject: 'loop3' (0000000006dd926c): kobject_uevent_env [ 584.335471][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0' 19:25:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) 19:25:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x4, "8d2b3136"}, 0x0) 19:25:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 19:25:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="516ac422ecfc167c21c466a7df6d5aa31dc0ebc065cfcca056b78d348dbf9fd3d2218d531880f0766bcd7854a3c2a0d71f916aab6702514479111b3ad8d02a2f8472343b14b4bd178bb6182e57cb11a7c4be509e9011c7ae8647fbe7aa99dac822e278314a2f86fbb8c3b9dcd2adf409245458ef6642789da79259d90077a34479517733526b9efa0ce2e14b3c93a5cdc17db3dac4cc4e7a99b6dec48a0d9b0a166bf2353eff819d8c9a7ebaec", 0xad}, {&(0x7f0000000140)="d69cf9e09a2655b5d78d13d564a5e04abe01f588238dbd6de6f8230ae1a33cacd807330ba6462d44a3719aa926ab2c2ade49b2c62dd3f1d5747d535ccb50230ca806e11ccabef0e878372aa687266f1c7e14c341a031beb8aad827ffd9f263ccc9f9a3331a6369a490370127fd0a8ef0b8ae90052233b9fce322144f5f35d5a14138f5e59d", 0x85}], 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 584.338629][T32573] kobject: 'loop3' (0000000006dd926c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 584.362744][ T3876] kobject: 'loop2' (00000000efc66d83): kobject_uevent_env 19:25:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x4, "8d2b3136"}, 0x0) [ 584.403958][ T3876] kobject: 'loop2' (00000000efc66d83): fill_kobj_path: path = '/devices/virtual/block/loop2' 19:25:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 19:25:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="080000000000000045300ae317d9700bacdf852c7f9643f23a9729e1d1cfbc6ab8f342abb6f90d39a7bfa73e7b385cd918de7ef08936be8ee34d144d55892c78a25ce1da578b4a5bab957be92f01fa24043b286bc2185d59c1a847c5cf2e01902060bb8f3bbcfaef936727ecca30f1f6bc7e07189b3036a8c90ba4229cecf524d62564856a13218416a9a7ac5b0afeeff6f7a6ee852978518a021022ceda229554955efef9a870744c580242e217fb15b5f426fba3bc8f586e6434e9aca6abf5a40476e77556e7d1070f348b0259859f51a74cc14c1d9a9275705c324a2781854ca8"], 0x3138) [ 584.470589][ T7650] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 584.486955][T32573] XFS (loop3): Invalid superblock magic number [ 584.496299][ T7650] kobject: 'loop1' (00000000772a8f8d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 584.540034][ T3876] kobject: 'loop4' (00000000da3c8430): kobject_uevent_env [ 584.569086][ T3876] kobject: 'loop4' (00000000da3c8430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 584.619339][ T3876] kobject: 'loop0' (000000005f2aa349): kobject_uevent_env [ 584.643474][T32698] kobject: 'loop1' (00000000772a8f8d): kobject_uevent_env [ 584.658528][ T3876] kobject: 'loop0' (000000005f2aa349): fill_kobj_path: path = '/devices/virtual/block/loop0'