20002. Sending cookies. Check SNMP counters. 00:51:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x5, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0xdd7) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}}], 0x30) 00:51:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x300], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:07 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:07 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5421, &(0x7f0000000000)) [ 743.594704] XFS (loop5): Mounting V4 Filesystem [ 743.600062] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 743.608533] XFS (loop5): Log size out of supported range. [ 743.614122] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 743.627172] XFS (loop5): Invalid block length (0x1) for buffer [ 743.633530] XFS (loop5): empty log check failed [ 743.638286] XFS (loop5): log mount/recovery failed: error -12 [ 743.672690] XFS (loop5): log mount failed 00:51:08 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}}], 0x30) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f00000000c0)={0x2, 0x5}) [ 743.767205] XFS (loop5): Mounting V4 Filesystem 00:51:08 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0045877, &(0x7f0000000000)) 00:51:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfe80], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 743.803306] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 743.811860] XFS (loop5): Log size out of supported range. [ 743.817554] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 743.969535] XFS (loop5): AIL initialisation failed: error -12 [ 743.978449] XFS (loop5): log mount failed 00:51:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x9], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:08 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}}], 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) r2 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x0, r2}) socketpair(0x11, 0x0, 0x2, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) fchown(r0, r1, r4) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) 00:51:08 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8940, &(0x7f0000000000)) 00:51:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xd100, @loopback={0x0, 0x1}}, 0x1c) 00:51:08 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:08 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(0xffffffffffffffff, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:08 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(0xffffffffffffffff, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 744.476569] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa00000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:08 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0xb, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @generic={0x7, 0x800, 0x1, 0x8d1a}, @exit={0x95}, @exit={0x95}], {0x95}}, &(0x7f0000000040)='GPL\x00', 0x9, 0xce, &(0x7f0000000140)=""/206, 0x41100, 0x1, [], 0x0, 0xa}, 0x48) write(r0, &(0x7f0000000300)="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", 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}, 0x400000000003fe}], 0x1d) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00'}) 00:51:08 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(0xffffffffffffffff, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:08 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8982, &(0x7f0000000000)) [ 744.543944] XFS (loop5): Mounting V4 Filesystem [ 744.556663] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 744.565243] XFS (loop5): Log size out of supported range. [ 744.570870] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 744.636752] XFS (loop5): Invalid block length (0x1) for buffer [ 744.642902] XFS (loop5): empty log check failed [ 744.647652] XFS (loop5): log mount/recovery failed: error -12 [ 744.682604] XFS (loop5): log mount failed 00:51:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x8000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:09 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:09 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1000, 0x8000) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f00000000c0)="a6ba2acd945a0e27", 0x8) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}}], 0x30) [ 744.833710] XFS (loop5): Mounting V4 Filesystem 00:51:09 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8901, &(0x7f0000000000)) 00:51:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 744.863305] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 744.871760] XFS (loop5): Log size out of supported range. [ 744.877373] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 744.889348] XFS (loop5): AIL initialisation failed: error -12 [ 744.895929] XFS (loop5): log mount failed 00:51:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x288, @loopback={0x0, 0x1}}, 0x1c) [ 745.155086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:09 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d3, &(0x7f0000000000)) 00:51:09 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x80000) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}}], 0x30) 00:51:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xdc05000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:09 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0189436, &(0x7f0000000000)) 00:51:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x100000000000000, @loopback={0x0, 0x1}}, 0x1c) [ 745.467636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:09 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d3, &(0x7f0000000000)) 00:51:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x82000, 0x0) ioctl$TCSBRK(r1, 0x5409, 0xfffffffffffffffb) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}}], 0x30) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000100)={0x13, 0x1d, &(0x7f00000000c0)="e3b55200bc39c43f282ff3577298a7b6861e958a537fc2312399a84cfc"}) ioctl$TCSBRK(r1, 0x5409, 0x9) [ 745.532316] XFS (loop5): Mounting V4 Filesystem 00:51:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xd000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:09 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5451, &(0x7f0000000000)) [ 745.567013] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 745.575612] XFS (loop5): Log size out of supported range. [ 745.581271] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:10 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d3, &(0x7f0000000000)) 00:51:10 executing program 6 (fault-call:4 fault-nth:0): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0)={{0x7fffffff, 0x5}, 0x60}, 0x10) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x1, 0x6, 0x2}, {{0x77359400}}], 0x30) [ 745.678944] XFS (loop5): Invalid block length (0x1) for buffer [ 745.685129] XFS (loop5): empty log check failed [ 745.690052] XFS (loop5): log mount/recovery failed: error -12 [ 745.761592] FAULT_INJECTION: forcing a failure. [ 745.761592] name failslab, interval 1, probability 0, space 0, times 0 [ 745.773016] CPU: 1 PID: 22749 Comm: syz-executor6 Not tainted 4.18.0-rc2+ #121 [ 745.780406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.785583] XFS (loop5): log mount failed [ 745.789776] Call Trace: [ 745.789811] dump_stack+0x1c9/0x2b4 [ 745.789833] ? dump_stack_print_info.cold.2+0x52/0x52 [ 745.789851] ? graph_lock+0x170/0x170 [ 745.789863] ? do_raw_spin_lock+0xc1/0x200 [ 745.789887] should_fail.cold.4+0xa/0x1a [ 745.789901] ? __fdget_pos+0x1bb/0x200 [ 745.789925] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 745.826579] ? find_held_lock+0x36/0x1c0 [ 745.830696] ? check_same_owner+0x340/0x340 [ 745.835047] ? rcu_note_context_switch+0x730/0x730 [ 745.840001] ? expand_files.part.8+0x9c0/0x9c0 [ 745.844603] ? lock_downgrade+0x8f0/0x8f0 [ 745.848779] __should_failslab+0x124/0x180 [ 745.853026] should_failslab+0x9/0x14 [ 745.856822] kmem_cache_alloc+0x2af/0x760 [ 745.860969] sock_alloc_inode+0x78/0x320 [ 745.865025] ? sock_destroy_inode+0x70/0x70 [ 745.869357] ? fget_raw+0x20/0x20 [ 745.872814] ? proc_cwd_link+0x1d0/0x1d0 [ 745.876871] ? sock_destroy_inode+0x70/0x70 [ 745.881199] alloc_inode+0x63/0x190 [ 745.885000] new_inode_pseudo+0x71/0x1a0 [ 745.889066] ? prune_icache_sb+0x1b0/0x1b0 [ 745.893294] ? kasan_check_write+0x14/0x20 [ 745.897527] sock_alloc+0x41/0x270 [ 745.901059] __sys_accept4+0x11c/0x8a0 [ 745.904939] ? __ia32_sys_listen+0x80/0x80 [ 745.909171] ? __sb_end_write+0xac/0xe0 [ 745.913142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 745.918666] ? fput+0x130/0x1a0 [ 745.921934] ? ksys_write+0x1ae/0x260 [ 745.925727] ? __ia32_sys_read+0xb0/0xb0 [ 745.929777] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 745.935310] __x64_sys_accept4+0x97/0xf0 [ 745.939361] do_syscall_64+0x1b9/0x820 [ 745.943238] ? finish_task_switch+0x1d3/0x890 [ 745.947721] ? syscall_return_slowpath+0x5e0/0x5e0 [ 745.952649] ? syscall_return_slowpath+0x31d/0x5e0 [ 745.957573] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 745.962930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.967771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.972950] RIP: 0033:0x455a99 [ 745.976489] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.995844] RSP: 002b:00007fedd94e5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 746.003547] RAX: ffffffffffffffda RBX: 00007fedd94e66d4 RCX: 0000000000455a99 [ 746.010802] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000013 [ 746.018059] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 746.025315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 746.032572] R13: 00000000004bb4ef R14: 00000000004c8070 R15: 0000000000000000 [ 746.136577] XFS (loop5): Mounting V4 Filesystem [ 746.171786] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 746.180286] XFS (loop5): Log size out of supported range. [ 746.185895] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 746.202472] XFS (loop5): AIL initialisation failed: error -12 [ 746.208957] XFS (loop5): log mount failed 00:51:10 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8981, &(0x7f0000000000)) 00:51:10 executing program 3: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) 00:51:10 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:10 executing program 6 (fault-call:4 fault-nth:1): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x142800, @loopback={0x0, 0x1}}, 0x1c) 00:51:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530d3", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 746.385763] FAULT_INJECTION: forcing a failure. [ 746.385763] name failslab, interval 1, probability 0, space 0, times 0 [ 746.397118] CPU: 0 PID: 22786 Comm: syz-executor6 Not tainted 4.18.0-rc2+ #121 [ 746.404481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.413826] Call Trace: [ 746.416415] dump_stack+0x1c9/0x2b4 [ 746.420047] ? dump_stack_print_info.cold.2+0x52/0x52 [ 746.425229] ? __save_stack_trace+0x8d/0xf0 [ 746.429558] should_fail.cold.4+0xa/0x1a [ 746.433616] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 746.438711] ? save_stack+0x43/0xd0 [ 746.442325] ? kasan_kmalloc+0xc4/0xe0 [ 746.446199] ? kasan_slab_alloc+0x12/0x20 [ 746.450334] ? kmem_cache_alloc+0x12e/0x760 [ 746.454646] ? sock_alloc_inode+0x78/0x320 [ 746.458875] ? alloc_inode+0x63/0x190 [ 746.462666] ? new_inode_pseudo+0x71/0x1a0 [ 746.466886] ? __sys_accept4+0x11c/0x8a0 [ 746.470943] ? __x64_sys_accept4+0x97/0xf0 [ 746.475166] ? do_syscall_64+0x1b9/0x820 [ 746.479215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.484574] ? find_held_lock+0x36/0x1c0 [ 746.488648] ? check_same_owner+0x340/0x340 [ 746.492954] ? rcu_is_watching+0x8c/0x150 [ 746.497089] ? rcu_note_context_switch+0x730/0x730 [ 746.502015] __should_failslab+0x124/0x180 [ 746.506247] should_failslab+0x9/0x14 [ 746.510039] kmem_cache_alloc_trace+0x2cb/0x780 [ 746.514695] ? kmem_cache_alloc+0x5fa/0x760 [ 746.519022] sock_alloc_inode+0xbc/0x320 [ 746.523074] ? sock_destroy_inode+0x70/0x70 [ 746.527381] ? fget_raw+0x20/0x20 [ 746.530830] ? proc_cwd_link+0x1d0/0x1d0 [ 746.534880] ? sock_destroy_inode+0x70/0x70 [ 746.539191] alloc_inode+0x63/0x190 [ 746.542805] new_inode_pseudo+0x71/0x1a0 [ 746.546853] ? prune_icache_sb+0x1b0/0x1b0 [ 746.551077] ? kasan_check_write+0x14/0x20 [ 746.555303] sock_alloc+0x41/0x270 [ 746.558831] __sys_accept4+0x11c/0x8a0 [ 746.562710] ? __ia32_sys_listen+0x80/0x80 [ 746.566938] ? __sb_end_write+0xac/0xe0 [ 746.570906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 746.576427] ? fput+0x130/0x1a0 [ 746.579695] ? ksys_write+0x1ae/0x260 [ 746.583486] ? __ia32_sys_read+0xb0/0xb0 [ 746.587531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 746.593066] __x64_sys_accept4+0x97/0xf0 [ 746.597138] do_syscall_64+0x1b9/0x820 [ 746.601015] ? finish_task_switch+0x1d3/0x890 [ 746.605505] ? syscall_return_slowpath+0x5e0/0x5e0 [ 746.610427] ? syscall_return_slowpath+0x31d/0x5e0 [ 746.615354] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 746.620719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.625559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.630745] RIP: 0033:0x455a99 [ 746.633930] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.653287] RSP: 002b:00007fedd94e5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 746.660984] RAX: ffffffffffffffda RBX: 00007fedd94e66d4 RCX: 0000000000455a99 [ 746.668239] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000013 [ 746.675496] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 746.682753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 746.690021] R13: 00000000004bb4ef R14: 00000000004c8070 R15: 0000000000000001 [ 746.707364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x80350000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:11 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:11 executing program 3 (fault-call:6 fault-nth:0): r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 746.767925] XFS (loop5): Mounting V4 Filesystem [ 746.778905] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 746.787385] XFS (loop5): Log size out of supported range. [ 746.793016] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:11 executing program 6 (fault-call:4 fault-nth:2): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 746.839852] XFS (loop5): Invalid block length (0x1) for buffer [ 746.846015] XFS (loop5): empty log check failed [ 746.850794] XFS (loop5): log mount/recovery failed: error -12 [ 746.906815] FAULT_INJECTION: forcing a failure. [ 746.906815] name failslab, interval 1, probability 0, space 0, times 0 [ 746.918153] CPU: 1 PID: 22820 Comm: syz-executor6 Not tainted 4.18.0-rc2+ #121 [ 746.925541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.934911] Call Trace: [ 746.937540] dump_stack+0x1c9/0x2b4 [ 746.941196] ? dump_stack_print_info.cold.2+0x52/0x52 [ 746.946413] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 746.951295] should_fail.cold.4+0xa/0x1a [ 746.953372] XFS (loop5): log mount failed [ 746.955411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 746.955436] ? __lock_acquire+0x7fc/0x5020 [ 746.955453] ? is_bpf_text_address+0xd7/0x170 [ 746.955475] ? kernel_text_address+0x79/0xf0 [ 746.955495] ? __kernel_text_address+0xd/0x40 [ 746.982329] ? graph_lock+0x170/0x170 [ 746.986157] ? find_held_lock+0x36/0x1c0 [ 746.990260] ? check_same_owner+0x340/0x340 [ 746.994598] ? expand_files.part.8+0x571/0x9c0 [ 746.999197] ? rcu_note_context_switch+0x730/0x730 00:51:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2800], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:11 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8980, &(0x7f0000000000)) [ 747.004143] __should_failslab+0x124/0x180 [ 747.008393] should_failslab+0x9/0x14 [ 747.012207] kmem_cache_alloc+0x2af/0x760 [ 747.016369] ? lock_downgrade+0x8f0/0x8f0 [ 747.020536] __d_alloc+0xc8/0xd50 [ 747.024004] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 747.028601] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 747.033639] ? _raw_spin_unlock+0x22/0x30 [ 747.037799] ? __alloc_fd+0x34e/0x710 [ 747.041623] ? exit_files+0xb0/0xb0 [ 747.045263] ? kasan_check_read+0x11/0x20 [ 747.049427] ? do_raw_spin_unlock+0xa7/0x2f0 [ 747.053844] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 747.058443] d_alloc_pseudo+0x1d/0x30 [ 747.062254] sock_alloc_file+0x15f/0x500 [ 747.066322] ? _raw_spin_unlock+0x22/0x30 [ 747.070478] ? sock_ioctl+0x680/0x680 [ 747.074287] ? get_unused_fd_flags+0x122/0x1a0 [ 747.078868] ? kasan_check_write+0x14/0x20 [ 747.083097] ? __alloc_fd+0x710/0x710 [ 747.086893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.092422] ? get_next_ino+0x8b/0x110 [ 747.096303] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 747.101227] __sys_accept4+0x28d/0x8a0 [ 747.105108] ? __ia32_sys_listen+0x80/0x80 [ 747.109339] ? __sb_end_write+0xac/0xe0 [ 747.113306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.118849] ? fput+0x130/0x1a0 [ 747.122118] ? ksys_write+0x1ae/0x260 [ 747.125907] ? __ia32_sys_read+0xb0/0xb0 [ 747.129954] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.135487] __x64_sys_accept4+0x97/0xf0 [ 747.139543] do_syscall_64+0x1b9/0x820 [ 747.143417] ? finish_task_switch+0x1d3/0x890 [ 747.147903] ? syscall_return_slowpath+0x5e0/0x5e0 [ 747.152842] ? syscall_return_slowpath+0x31d/0x5e0 [ 747.157766] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 747.163121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.167957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.173145] RIP: 0033:0x455a99 [ 747.176316] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.195649] RSP: 002b:00007fedd94e5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 747.203347] RAX: ffffffffffffffda RBX: 00007fedd94e66d4 RCX: 0000000000455a99 [ 747.210602] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000013 [ 747.217858] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 747.225113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 747.232369] R13: 00000000004bb4ef R14: 00000000004c8070 R15: 0000000000000002 00:51:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x89a1, &(0x7f0000000000)) 00:51:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x8035], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 747.298874] XFS (loop5): Mounting V4 Filesystem [ 747.306533] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 747.314967] XFS (loop5): Log size out of supported range. [ 747.320582] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 747.370429] XFS (loop5): Invalid block length (0x1) for buffer [ 747.376690] XFS (loop5): empty log check failed [ 747.381429] XFS (loop5): log mount/recovery failed: error -12 [ 747.413050] XFS (loop5): log mount failed 00:51:11 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x54000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:11 executing program 6 (fault-call:4 fault-nth:3): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:11 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0045877, &(0x7f0000000000)) 00:51:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530ff", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xffff000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8980, &(0x7f0000000000)) [ 747.659132] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 747.678804] FAULT_INJECTION: forcing a failure. [ 747.678804] name failslab, interval 1, probability 0, space 0, times 0 [ 747.690137] CPU: 0 PID: 22868 Comm: syz-executor6 Not tainted 4.18.0-rc2+ #121 [ 747.697516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.706888] Call Trace: [ 747.709511] dump_stack+0x1c9/0x2b4 [ 747.713171] ? dump_stack_print_info.cold.2+0x52/0x52 [ 747.718393] ? save_stack+0xa9/0xd0 [ 747.722060] should_fail.cold.4+0xa/0x1a [ 747.726160] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.731293] ? lock_downgrade+0x8f0/0x8f0 [ 747.735462] ? graph_lock+0x170/0x170 [ 747.737909] XFS (loop5): Mounting V4 Filesystem [ 747.739278] ? kasan_check_read+0x11/0x20 [ 747.739302] ? find_held_lock+0x36/0x1c0 [ 747.739342] ? check_same_owner+0x340/0x340 [ 747.739355] ? graph_lock+0x170/0x170 [ 747.739375] ? rcu_note_context_switch+0x730/0x730 [ 747.764717] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 747.765313] ? kasan_check_read+0x11/0x20 [ 747.765336] __should_failslab+0x124/0x180 [ 747.765359] should_failslab+0x9/0x14 [ 747.765377] kmem_cache_alloc+0x2af/0x760 [ 747.765397] ? find_held_lock+0x36/0x1c0 [ 747.765417] get_empty_filp+0x12d/0x530 [ 747.773781] XFS (loop5): Log size out of supported range. [ 747.777871] ? proc_nr_files+0x60/0x60 00:51:12 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8982, &(0x7f0000000000)) [ 747.777888] ? _raw_spin_unlock+0x22/0x30 [ 747.777906] ? kasan_check_read+0x11/0x20 [ 747.777920] ? do_raw_spin_unlock+0xa7/0x2f0 [ 747.777931] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 747.777946] ? kasan_check_write+0x14/0x20 [ 747.777958] ? do_raw_spin_lock+0xc1/0x200 [ 747.777974] alloc_file+0x24/0x3e0 [ 747.777991] sock_alloc_file+0x1fb/0x500 [ 747.778010] ? _raw_spin_unlock+0x22/0x30 [ 747.782263] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 747.786019] ? sock_ioctl+0x680/0x680 [ 747.786036] ? get_unused_fd_flags+0x122/0x1a0 [ 747.786055] ? kasan_check_write+0x14/0x20 [ 747.848406] FAULT_INJECTION: forcing a failure. [ 747.848406] name fail_futex, interval 1, probability 0, space 0, times 1 [ 747.856624] ? __alloc_fd+0x710/0x710 [ 747.856642] ? get_next_ino+0x8b/0x110 [ 747.856662] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 747.856684] __sys_accept4+0x28d/0x8a0 [ 747.896998] ? __ia32_sys_listen+0x80/0x80 [ 747.901235] ? __sb_end_write+0xac/0xe0 [ 747.905210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.910740] ? fput+0x130/0x1a0 [ 747.914016] ? ksys_write+0x1ae/0x260 [ 747.917813] ? __ia32_sys_read+0xb0/0xb0 [ 747.921869] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.927404] __x64_sys_accept4+0x97/0xf0 [ 747.931461] do_syscall_64+0x1b9/0x820 [ 747.935343] ? finish_task_switch+0x1d3/0x890 [ 747.939834] ? syscall_return_slowpath+0x5e0/0x5e0 [ 747.944755] ? syscall_return_slowpath+0x31d/0x5e0 [ 747.949682] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 747.955042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.959882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.965062] RIP: 0033:0x455a99 [ 747.968238] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.987555] RSP: 002b:00007fedd94e5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 747.995256] RAX: ffffffffffffffda RBX: 00007fedd94e66d4 RCX: 0000000000455a99 [ 748.002520] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000013 [ 748.009780] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 748.017041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 748.024301] R13: 00000000004bb4ef R14: 00000000004c8070 R15: 0000000000000003 [ 748.031582] CPU: 1 PID: 22882 Comm: syz-executor3 Not tainted 4.18.0-rc2+ #121 [ 748.038949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.048299] Call Trace: [ 748.050871] dump_stack+0x1c9/0x2b4 [ 748.054497] ? dump_stack_print_info.cold.2+0x52/0x52 [ 748.059668] ? rb_next+0x140/0x140 [ 748.063191] should_fail.cold.4+0xa/0x1a [ 748.067236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 748.072319] ? print_usage_bug+0xc0/0xc0 [ 748.076360] ? print_usage_bug+0xc0/0xc0 [ 748.080404] ? rb_erase_cached+0xc82/0x32c0 [ 748.084705] ? __lock_acquire+0x7fc/0x5020 [ 748.088918] ? print_usage_bug+0xc0/0xc0 [ 748.092961] ? __lock_acquire+0x7fc/0x5020 [ 748.097187] ? trace_hardirqs_on+0x10/0x10 [ 748.101403] get_futex_key+0x13db/0x1ea0 [ 748.105447] ? futex_lock_pi_atomic+0x3a0/0x3a0 [ 748.110100] ? trace_hardirqs_on+0x10/0x10 [ 748.114314] ? print_usage_bug+0xc0/0xc0 [ 748.118352] ? print_usage_bug+0xc0/0xc0 [ 748.122392] ? print_usage_bug+0xc0/0xc0 [ 748.126439] ? lock_downgrade+0x8f0/0x8f0 [ 748.130566] ? graph_lock+0x170/0x170 [ 748.134344] ? print_usage_bug+0xc0/0xc0 [ 748.138385] ? graph_lock+0x170/0x170 [ 748.142171] ? __lock_acquire+0x7fc/0x5020 [ 748.146389] ? print_usage_bug+0xc0/0xc0 [ 748.150430] ? check_noncircular+0x20/0x20 [ 748.154641] ? graph_lock+0x170/0x170 [ 748.158422] ? check_noncircular+0x20/0x20 [ 748.162636] ? lock_downgrade+0x8f0/0x8f0 [ 748.166768] ? find_held_lock+0x36/0x1c0 [ 748.170806] ? print_usage_bug+0xc0/0xc0 [ 748.174848] ? lock_downgrade+0x8f0/0x8f0 [ 748.178989] ? mark_held_locks+0xc9/0x160 [ 748.183134] ? __free_pages_ok+0x1d3b/0x2a60 [ 748.187523] ? trace_hardirqs_on+0xd/0x10 [ 748.191651] ? print_usage_bug+0xc0/0xc0 [ 748.195832] ? print_usage_bug+0xc0/0xc0 [ 748.199872] ? print_usage_bug+0xc0/0xc0 [ 748.203921] ? print_usage_bug+0xc0/0xc0 [ 748.207961] ? print_usage_bug+0xc0/0xc0 [ 748.212005] ? print_usage_bug+0xc0/0xc0 [ 748.216057] futex_wake+0x1ac/0x760 [ 748.219662] ? __lock_acquire+0x7fc/0x5020 [ 748.223876] ? __lock_acquire+0x7fc/0x5020 [ 748.228091] ? get_futex_key+0x1ea0/0x1ea0 [ 748.232304] ? __lock_acquire+0x7fc/0x5020 [ 748.236521] ? __lock_acquire+0x7fc/0x5020 [ 748.240739] do_futex+0x300/0x27d0 [ 748.244269] ? trace_hardirqs_on+0x10/0x10 [ 748.248485] ? exit_robust_list+0x290/0x290 [ 748.252787] ? trace_hardirqs_on+0x10/0x10 [ 748.257003] ? graph_lock+0x170/0x170 [ 748.260787] ? trace_hardirqs_on+0x10/0x10 [ 748.265023] ? graph_lock+0x170/0x170 [ 748.268817] ? graph_lock+0x170/0x170 [ 748.272598] ? graph_lock+0x170/0x170 [ 748.276378] ? find_held_lock+0x36/0x1c0 [ 748.280418] ? graph_lock+0x170/0x170 [ 748.284196] ? find_held_lock+0x36/0x1c0 [ 748.288237] ? find_held_lock+0x36/0x1c0 [ 748.292281] ? find_held_lock+0x36/0x1c0 [ 748.296333] ? lock_downgrade+0x8f0/0x8f0 [ 748.300462] ? lock_release+0xa30/0xa30 [ 748.304415] ? check_same_owner+0x340/0x340 [ 748.308719] ? native_load_gs_index+0x2d/0x30 [ 748.313936] mm_release+0x46a/0x5f0 [ 748.317549] ? mm_access+0x160/0x160 [ 748.321245] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 748.326240] ? trace_hardirqs_on+0xd/0x10 [ 748.330372] ? _raw_spin_unlock_irq+0x27/0x70 [ 748.334856] ? acct_collect+0x70c/0x860 [ 748.338811] do_exit+0x567/0x2750 [ 748.342250] ? mm_update_next_owner+0x9a0/0x9a0 [ 748.346897] ? print_usage_bug+0xc0/0xc0 [ 748.350947] ? __lock_acquire+0x7fc/0x5020 [ 748.355169] ? lock_downgrade+0x8f0/0x8f0 [ 748.359302] ? __lock_acquire+0x7fc/0x5020 [ 748.363519] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 748.368601] ? graph_lock+0x170/0x170 [ 748.372379] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 748.377378] ? trace_hardirqs_on+0x10/0x10 [ 748.381596] ? lock_downgrade+0x8f0/0x8f0 [ 748.385732] ? kasan_check_read+0x11/0x20 [ 748.389857] ? rcu_is_watching+0x8c/0x150 [ 748.393994] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 748.398388] ? graph_lock+0x170/0x170 [ 748.402171] ? mntput_no_expire+0x18e/0xbc0 [ 748.406483] ? _raw_spin_unlock+0x22/0x30 [ 748.410611] ? graph_lock+0x170/0x170 [ 748.414398] ? find_held_lock+0x36/0x1c0 [ 748.418453] ? memset+0x31/0x40 [ 748.421714] ? find_held_lock+0x36/0x1c0 [ 748.425768] ? lock_downgrade+0x8f0/0x8f0 [ 748.429898] do_group_exit+0x177/0x440 [ 748.433772] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 748.438332] ? __ia32_sys_exit+0x50/0x50 [ 748.442384] ? _raw_spin_unlock_irq+0x27/0x70 [ 748.446870] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 748.451866] get_signal+0x88e/0x1970 [ 748.455571] ? ptrace_notify+0x130/0x130 [ 748.459617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.465146] ? snd_seq_ioctl+0x2e9/0x440 [ 748.469188] ? snd_seq_open+0x5c0/0x5c0 [ 748.473146] do_signal+0x9c/0x21c0 [ 748.476668] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 748.481576] ? setup_sigcontext+0x7d0/0x7d0 [ 748.485875] ? snd_seq_open+0x5c0/0x5c0 [ 748.489837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.495362] ? do_vfs_ioctl+0x201/0x1720 [ 748.499404] ? __lock_is_held+0xb5/0x140 [ 748.503455] ? ioctl_preallocate+0x300/0x300 [ 748.507842] ? __fget_light+0x2f7/0x440 [ 748.511811] ? cpumask_weight.constprop.5+0x3f/0x3f [ 748.516806] ? exit_to_usermode_loop+0x8c/0x370 [ 748.521466] exit_to_usermode_loop+0x2e0/0x370 [ 748.526034] ? syscall_slow_exit_work+0x500/0x500 [ 748.530857] ? ksys_ioctl+0x81/0xd0 [ 748.534465] do_syscall_64+0x6be/0x820 [ 748.538335] ? finish_task_switch+0x1d3/0x890 [ 748.542811] ? syscall_return_slowpath+0x5e0/0x5e0 [ 748.547892] ? syscall_return_slowpath+0x31d/0x5e0 [ 748.552804] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 748.558157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.562983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.568153] RIP: 0033:0x455a99 [ 748.571317] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.590481] RSP: 002b:00007f0b9e06dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 748.598170] RAX: ffffffffffffffff RBX: 00007f0b9e06e6d4 RCX: 0000000000455a99 [ 748.605420] RDX: 00000000200000c0 RSI: 0000000040bc5311 RDI: 0000000000000013 00:51:12 executing program 6 (fault-call:4 fault-nth:4): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 748.612669] RBP: 000000000072bff0 R08: 0000000000000000 R09: 0000000000000000 [ 748.619915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 748.627162] R13: 00000000004c5418 R14: 00000000004cceb8 R15: 0000000000000000 [ 748.654504] XFS (loop5): AIL initialisation failed: error -12 [ 748.678716] XFS (loop5): log mount failed 00:51:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:13 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x894c, &(0x7f0000000000)) 00:51:13 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8941, &(0x7f0000000000)) 00:51:13 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:13 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\f', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 748.948484] XFS (loop5): Mounting V4 Filesystem [ 748.971990] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 748.980510] XFS (loop5): Log size out of supported range. [ 748.986126] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 749.011428] XFS (loop5): Invalid block length (0x1) for buffer [ 749.017671] XFS (loop5): empty log check failed 00:51:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc900, @loopback={0x0, 0x1}}, 0x1c) 00:51:13 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x894c, &(0x7f0000000000)) 00:51:13 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xe0ffffffffffffff, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:13 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x2, &(0x7f0000000000)) 00:51:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x543], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 749.022405] XFS (loop5): log mount/recovery failed: error -12 [ 749.045615] XFS (loop5): log mount failed [ 749.132392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:13 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xffffffffffffff7f, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 749.174986] XFS (loop5): Mounting V4 Filesystem 00:51:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4788], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:13 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8901, &(0x7f0000000000)) 00:51:13 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5452, &(0x7f0000000000)) [ 749.196828] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 749.205311] XFS (loop5): Log size out of supported range. [ 749.210933] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 749.324021] XFS (loop5): AIL initialisation failed: error -12 [ 749.361964] XFS (loop5): log mount failed 00:51:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{0x1, 0xfff, 0xfffffffffffff801, 0x1}, {0x6, 0x7, 0x1}, {0x4, 0x4, 0x5}]}, 0x10) set_robust_list(&(0x7f00000001c0)={&(0x7f0000000180)={&(0x7f0000000080)}, 0x1f}, 0x18) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:51:14 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x1400000000000000, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:14 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8904, &(0x7f0000000000)) 00:51:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0H', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x249f0, @loopback={0x0, 0x1}}, 0x1c) 00:51:14 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:14 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x400000000000000, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 749.877727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x4020940d, &(0x7f0000000000)) 00:51:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:14 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000000)) [ 749.999147] XFS (loop5): Mounting V4 Filesystem [ 750.005471] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 750.013929] XFS (loop5): Log size out of supported range. [ 750.019576] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:14 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x2000000000000000, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 750.067936] XFS (loop5): Invalid block length (0x1) for buffer [ 750.074526] XFS (loop5): empty log check failed [ 750.079274] XFS (loop5): log mount/recovery failed: error -12 00:51:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x2, &(0x7f0000000000)) 00:51:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 750.113930] XFS (loop5): log mount failed 00:51:14 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x1400, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 750.279186] XFS (loop5): Mounting V4 Filesystem [ 750.303904] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 750.313344] XFS (loop5): Log size out of supported range. [ 750.318975] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 750.351063] XFS (loop5): AIL initialisation failed: error -12 [ 750.358102] XFS (loop5): log mount failed 00:51:15 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0045878, &(0x7f0000000000)) 00:51:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8902, &(0x7f0000000000)) 00:51:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @loopback={0x0, 0x1}}, 0x1c) 00:51:15 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x4, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x63, "4ecb6bbd3f53a66d4c8e59d4559d6a773b08f7abd7039cf32673d3c0426864bab82ad9cc1f87650fe1494a1a8636b1a2b68f020e046b522b1829abd18b1ad993dc5ecd6e388e2cf7d3080ae69720491a3081a5c0dec0d67d05f7b9ffbc1c19d8608740"}, &(0x7f0000000280)=0x6b) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)={r2, 0x2, 0x1d, "ecfcbbeac47c516d48a6a112f6c9b3cea9f06fc93cd953a8d17972abfe"}, 0x25) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000180)={0x1, @tick, 0x4, {0x1, 0x7f}, 0x3, 0x2, 0x7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:15 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:15 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5451, &(0x7f0000000000)) 00:51:15 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x14, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 750.958807] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 751.021097] XFS (loop5): Mounting V4 Filesystem 00:51:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x89a0, &(0x7f0000000000)) [ 751.050197] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 751.058720] XFS (loop5): Log size out of supported range. [ 751.064348] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:15 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c9, &(0x7f0000000000)) 00:51:15 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xfeffffff00000000, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:15 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5452, &(0x7f0000000000)) [ 751.229551] XFS (loop5): Invalid block length (0x1) for buffer [ 751.235747] XFS (loop5): empty log check failed [ 751.240613] XFS (loop5): log mount/recovery failed: error -12 00:51:15 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x1000000000000, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8983, &(0x7f0000000000)) 00:51:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 751.297942] XFS (loop5): log mount failed [ 751.490842] XFS (loop5): Mounting V4 Filesystem [ 751.512238] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 751.520726] XFS (loop5): Log size out of supported range. [ 751.526339] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 751.561939] XFS (loop5): AIL initialisation failed: error -12 [ 751.569576] XFS (loop5): log mount failed 00:51:16 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8904, &(0x7f0000000000)) 00:51:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xffffffe0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:16 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5450, &(0x7f0000000000)) 00:51:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0xfffffffffffffdce) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") fcntl$setsig(r0, 0xa, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000180)={'security\x00', 0x2, [{}, {}]}, 0x48) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5dc], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x20000000, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1100000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:16 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x4020940d, &(0x7f0000000000)) 00:51:16 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8902, &(0x7f0000000000)) 00:51:16 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xe0ff, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 752.064614] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:16 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0189436, &(0x7f0000000000)) [ 752.115678] XFS (loop5): Mounting V4 Filesystem [ 752.126623] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 752.135133] XFS (loop5): Log size out of supported range. [ 752.140858] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x81, 0x4000) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80000001, 0x200000) 00:51:16 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc020660b, &(0x7f0000000000)) 00:51:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:16 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8903, &(0x7f0000000000)) [ 752.229146] XFS (loop5): Invalid block length (0x1) for buffer [ 752.235310] XFS (loop5): empty log check failed [ 752.240073] XFS (loop5): log mount/recovery failed: error -12 [ 752.267522] XFS (loop5): log mount failed 00:51:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xfffffffe, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x7fffffffffffffff, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:16 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0045878, &(0x7f0000000000)) [ 752.416811] XFS (loop5): Mounting V4 Filesystem [ 752.424452] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 752.433233] XFS (loop5): Log size out of supported range. [ 752.438882] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 752.569865] XFS (loop5): AIL initialisation failed: error -12 [ 752.579550] XFS (loop5): log mount failed 00:51:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530ce", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:17 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8981, &(0x7f0000000000)) 00:51:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xe0ffffff, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 752.768747] XFS (loop5): Mounting V4 Filesystem [ 752.777990] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 752.786525] XFS (loop5): Log size out of supported range. [ 752.792144] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 752.820318] XFS (loop5): Invalid block length (0x1) for buffer [ 752.826546] XFS (loop5): empty log check failed [ 752.831273] XFS (loop5): log mount/recovery failed: error -12 [ 752.837666] XFS (loop5): log mount failed [ 752.866495] XFS (loop5): Mounting V4 Filesystem [ 752.873827] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 752.882302] XFS (loop5): Log size out of supported range. [ 752.887944] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 752.901115] XFS (loop5): Invalid block length (0x1) for buffer [ 752.907253] XFS (loop5): empty log check failed 00:51:17 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:17 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:51:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe8030000, @loopback={0x0, 0x1}}, 0x1c) [ 752.912010] XFS (loop5): log mount/recovery failed: error -12 [ 752.919539] XFS (loop5): log mount failed 00:51:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x14000000, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 753.010294] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0xffdffffffffffffe) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400000, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000180)) r2 = socket$inet6(0xa, 0x807, 0x6) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xffe0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:17 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5460, &(0x7f0000000000)) 00:51:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0&', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:17 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c9, &(0x7f0000000000)) 00:51:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xd1, @loopback={0x0, 0x1}}, 0x1c) 00:51:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xffffffffffffffe0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:17 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x89a0, &(0x7f0000000000)) [ 753.256226] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:17 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8941, &(0x7f0000000000)) 00:51:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 753.316653] XFS (loop5): Mounting V4 Filesystem [ 753.332977] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 753.341535] XFS (loop5): Log size out of supported range. [ 753.347160] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 753.413264] XFS (loop5): Invalid block length (0x1) for buffer [ 753.419505] XFS (loop5): empty log check failed [ 753.424285] XFS (loop5): log mount/recovery failed: error -12 00:51:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x4000000, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 753.474221] XFS (loop5): log mount failed [ 753.603382] XFS (loop5): Mounting V4 Filesystem [ 753.610950] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 753.619511] XFS (loop5): Log size out of supported range. [ 753.625194] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 753.652577] XFS (loop5): Invalid block length (0x1) for buffer [ 753.658757] XFS (loop5): empty log check failed [ 753.663558] XFS (loop5): log mount/recovery failed: error -12 [ 753.687714] XFS (loop5): log mount failed 00:51:18 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5450, &(0x7f0000000000)) 00:51:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x100) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20}], 0xa, "c822c0da7ff35841580f1f0d180c6e78c6682f022ad1906e637082f0d23ffd772389bc799c3cfd14aa9e803aed3f7ac349ff0b764279c56f4480d678836de6240939d6fecb9dc7c9c28aa7b9ce49a8bd9f68607173ec803365e4c0650a29fe2bca74e08eaa8552433abc3f4f4687ef611bc2994c17db1718d138a8ac3ccee90563073c200c5450424629563d7f58"}, 0x9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2, 0x80) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x40049409, &(0x7f0000000000)) 00:51:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:18 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x2000, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x600000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:18 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xe0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 753.910726] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8940, &(0x7f0000000000)) 00:51:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 753.985520] XFS (loop5): Mounting V4 Filesystem [ 753.992613] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 754.001165] XFS (loop5): Log size out of supported range. [ 754.006803] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 754.022151] XFS (loop5): Invalid block length (0x1) for buffer [ 754.028293] XFS (loop5): empty log check failed 00:51:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8903, &(0x7f0000000000)) [ 754.033055] XFS (loop5): log mount/recovery failed: error -12 00:51:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc020660b, &(0x7f0000000000)) [ 754.090546] XFS (loop5): log mount failed 00:51:18 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0xfeffffff, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8983, &(0x7f0000000000)) [ 754.207637] XFS (loop5): Mounting V4 Filesystem [ 754.214710] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 754.223194] XFS (loop5): Log size out of supported range. [ 754.228837] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 754.245671] XFS (loop5): Invalid block length (0x1) for buffer [ 754.251868] XFS (loop5): empty log check failed [ 754.256661] XFS (loop5): log mount/recovery failed: error -12 [ 754.328120] XFS (loop5): log mount failed 00:51:19 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:19 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x100406, r0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000001c0)=0xfffffe45) ioctl$TCSBRKP(r1, 0x5425, 0x1) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000014000000ac641defc80000008100000001000000f9ffffff8fba016fdd99e2114ab2afe4ab28dad16af910838d6312e96354f51e009c128442f8d57be02eb86dc7d94ac78b7a1f053cc6d4398d2f2b9920580c2061b7889db09c330001a63243d55b5c16c99566c0bbc5c841515db8bff56997ac7b2dca5425c6ea42241263407ed70b3143021d0975abf98e4bc31a6bc2143358b22b2a28a404ffeede326169d194346e959df3f7d499caed3bc6c34516ac591946dad22b882dd065ddbc84ad5062c1ccccaa6e8e2eee2790d7c5e627de51f04a1c8947ff1bf4973472b328ee7cdbf19936dd8d2a08c1d660266dd335759165773c3bab581e05c3d946827606eaf67731c08996f9aea82da8f29fd6458dc9e826a52187a59571c7d5f9eee4479d09dbbae32dfb26000000000000c94b16aa223b8eb2debe80f0b2e2eed3ed6465ee5966090fb4c69f99c81f3520722bbf4b77c2893609472d910e62e7ee6e24"]) 00:51:19 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x14000000, @any=0xffffffff}, 0x10, 0x0) 00:51:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:19 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x89a1, &(0x7f0000000000)) 00:51:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe093040000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530d5", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x7a}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) mbind(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, &(0x7f0000000080)=0x8001, 0x100000000, 0x6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = shmget(0x1, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:19 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xffe0, @any=0xffffffff}, 0x10, 0x0) [ 755.001815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:19 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x40049409, &(0x7f0000000000)) 00:51:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:19 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0xa, 0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 755.052305] XFS (loop5): Mounting V4 Filesystem [ 755.064842] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 755.073330] XFS (loop5): Log size out of supported range. [ 755.078966] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:19 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xe0, @any=0xffffffff}, 0x10, 0x0) 00:51:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:19 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000000)) [ 755.217650] XFS (loop5): Invalid block length (0x1) for buffer [ 755.223899] XFS (loop5): empty log check failed [ 755.228644] XFS (loop5): log mount/recovery failed: error -12 [ 755.238999] XFS (loop5): log mount failed 00:51:19 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x2000, @any=0xffffffff}, 0x10, 0x0) [ 755.419087] XFS (loop5): Mounting V4 Filesystem [ 755.437669] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 755.446157] XFS (loop5): Log size out of supported range. [ 755.451761] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 755.478771] XFS (loop5): AIL initialisation failed: error -12 [ 755.486198] XFS (loop5): log mount failed 00:51:20 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) setsockopt$packet_int(r1, 0x107, 0x1e, &(0x7f0000000040)=0x1, 0x4) 00:51:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:20 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xe0ff, @any=0xffffffff}, 0x10, 0x0) 00:51:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5421, &(0x7f0000000000)) 00:51:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x2800, @loopback={0x0, 0x1}}, 0x1c) 00:51:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x25, @time, 0x0, {0x0, 0x1}, 0x0, 0x4}) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)='proc\x00', 0x0) keyctl$invalidate(0x15, r2) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000003c0)={0xfffffffffffff801, 0x0, 0x0, 'queue0\x00', 0x20}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000100)={0x9, 0x7ff, 0x398, 0xffffffffffffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000000340)=""/128) close(r0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @host=0x2}, 0x10, 0x80800) close(r5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:20 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x4, @any=0xffffffff}, 0x10, 0x0) [ 756.035771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x28080, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="ddbc00000000000000000044ab7e0548ec3c10c367508b9c1e6f"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8906], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 756.108065] XFS (loop5): Mounting V4 Filesystem [ 756.113648] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 756.122146] XFS (loop5): Log size out of supported range. [ 756.127749] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 756.140833] XFS (loop5): Invalid block length (0x1) for buffer [ 756.147411] XFS (loop5): empty log check failed [ 756.152156] XFS (loop5): log mount/recovery failed: error -12 [ 756.159882] XFS (loop5): log mount failed 00:51:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0xffffffffffffff3b, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000002c0)={r7, 0x1f, 0x3, [0x80000001, 0xff, 0x7f]}, 0xe) write$evdev(r1, &(0x7f0000000100)=[{{0x77359400}, 0x2, 0x3ff, 0x9}, {{r3, r4/1000+10000}, 0x400, 0x9}, {{0x0, 0x7530}, 0x2, 0x4, 0x20}, {{0x77359400}, 0x100, 0x101, 0x9}, {{r5, r6/1000+10000}, 0xeae5, 0xfff, 0x1006c5}, {{}, 0x1f00000000000, 0x400, 0xfffffffffffffffe}], 0x90) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:20 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x2000000000000000, @any=0xffffffff}, 0x10, 0x0) 00:51:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @loopback=0x7f000001}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}], 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x1, 0xdd, 0x7fffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 756.379216] XFS (loop5): Mounting V4 Filesystem [ 756.406868] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 756.415314] XFS (loop5): Log size out of supported range. [ 756.420932] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 756.466960] XFS (loop5): Invalid block length (0x1) for buffer [ 756.473199] XFS (loop5): empty log check failed [ 756.477935] XFS (loop5): log mount/recovery failed: error -12 [ 756.486507] XFS (loop5): log mount failed [ 756.541617] XFS (loop5): Mounting V4 Filesystem [ 756.548926] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 756.557413] XFS (loop5): Log size out of supported range. [ 756.563063] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 756.575462] XFS (loop5): Invalid block length (0x1) for buffer [ 756.581542] XFS (loop5): empty log check failed [ 756.586276] XFS (loop5): log mount/recovery failed: error -12 [ 756.594749] XFS (loop5): log mount failed 00:51:21 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:21 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000040)) 00:51:21 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xffffffffffffff7f, @any=0xffffffff}, 0x10, 0x0) 00:51:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f00000007c0)=ANY=[@ANYRES64=r1, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES16=r0, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES16=r0, @ANYBLOB="ffd7b2a1cc27a6428ba258f745b12f07d3824ad5f659719cd38044dd247bf8257d3a2f431484401ac42fee7a54c2bfa71527d7b3d311f11bf1b70a780cec"], @ANYRES64=0x0, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="afc46dadb984aaa1b518d159bca52dfee2761daf9026bc0277cc476ab50d", @ANYPTR64], @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=r0, @ANYRES32=r0, @ANYPTR, @ANYPTR, @ANYRES16=r1, @ANYRES16, @ANYRES32=r1, @ANYPTR64], @ANYRES64=0x0], @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRES16=r1, @ANYRES64=r1, @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYPTR]], @ANYRES64=r1, @ANYRES32=r1, @ANYRES64=r1, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR, @ANYRES64, @ANYRES64=r1, @ANYRES32=r0, @ANYRES64=r0, @ANYBLOB="2a0c74d44ea8e42bff91ac062312576fee792afa0e7dbe8dedeeefce989a7287423cf0ffb0005463be29129042185136fa4862d2b8efa573664140487b7effdb679c9928", @ANYRES64=r1, @ANYRES32=r1, @ANYPTR], @ANYRES16=r0, @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64=r1, @ANYRES64=r1, @ANYBLOB="02ed2552abf0d67a4ea4dc242fcba2b1ed7f002e9b6d65caf951656f0f57be91bc12e1abe647cccdbe57b9773c8c292fc269bf41532437f3eb6dc4c0185a0138ff588b13d770b65cb0c3ea162d93d67a1f0713f726898872f5bcb740ad948373ce51d52a62ae54dee0d38b5a09e939fe", @ANYPTR64], @ANYRES32=r0], @ANYBLOB="e278d408bbf704548b0ec012d1b191843f42a844e56ba41e5fd082dd9f1190c5a866629bed8296a44aeebc77b69c0ad843a633f929ee"]) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000140)=0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00082abd7000fedbdfe3b0705b1faf5714da12000000000000000000000800080000ffffffff000800000000000800000000003052000000000005000000"], 0x44}, 0x1, 0x0, 0x0, 0x40080}, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000003c0)={0x3, {{0xa, 0x4e23, 0x74, @mcast1={0xff, 0x1, [], 0x1}, 0x800}}}, 0x88) getsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000300), &(0x7f0000000340)=0x4) 00:51:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530ff", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xffffff8d, @loopback={0x0, 0x1}}, 0x1c) 00:51:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x1, 0x0, 0x0, 'queue1\x00', 0xfffffffffffffffc}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 757.099526] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:21 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x1000000000000, @any=0xffffffff}, 0x10, 0x0) 00:51:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) open(&(0x7f0000000040)='./file0\x00', 0x40080, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) bind$inet6(r2, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000540)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000775000)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="c21857cd048eb6f443ad52be7817f95010c14c7814e5897f10436695b0cb776a1dabcbe6699ced5ae9c74087dc59f49f9524da3456ffffbe114581d61aa0b5a9d5db451084264b5c43be1661f517d0287702de8b4a"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 757.152162] XFS (loop5): Mounting V4 Filesystem 00:51:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 757.177752] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 757.186264] XFS (loop5): Log size out of supported range. [ 757.191886] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:21 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:21 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xe0ffffff, @any=0xffffffff}, 0x10, 0x0) [ 757.260771] XFS (loop5): Invalid block length (0x1) for buffer [ 757.266948] XFS (loop5): empty log check failed [ 757.271715] XFS (loop5): log mount/recovery failed: error -12 [ 757.307069] XFS (loop5): log mount failed 00:51:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x620000) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x6) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:21 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xfeffffff, @any=0xffffffff}, 0x10, 0x0) 00:51:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x608], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 757.471819] XFS (loop5): Mounting V4 Filesystem [ 757.489965] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 757.498443] XFS (loop5): Log size out of supported range. [ 757.504056] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 757.526429] XFS (loop5): Invalid block length (0x1) for buffer [ 757.532556] XFS (loop5): empty log check failed [ 757.537305] XFS (loop5): log mount/recovery failed: error -12 [ 757.558564] XFS (loop5): log mount failed 00:51:22 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000c80000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:22 executing program 1: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, r0, 0xffffffffffff24c2, 0x0, &(0x7f0000000000), 0x0, 0x400000000}) 00:51:22 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x1400, @any=0xffffffff}, 0x10, 0x0) 00:51:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530d1", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x54, @loopback={0x0, 0x1}}, 0x1c) 00:51:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0xfdfffffffffffffd, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x200400) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000180)={{0x7, 0xffffffff}, 'port1\x00', 0x60, 0x20000, 0x1, 0x0, 0x4, 0x6, 0x0, 0x0, 0x7, 0x2}) poll(&(0x7f0000000240)=[{r0, 0x8028}, {r2, 0x6000}, {r1}, {r2, 0x4001}, {r0, 0x400}, {r0}, {r2, 0x209c}, {r2}, {r2}, {r1, 0x1200}], 0xa, 0x9) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r3 = msgget$private(0x0, 0x10) msgctl$IPC_RMID(r3, 0x0) 00:51:22 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}) [ 758.165753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 758.199608] XFS (loop5): Mounting V4 Filesystem 00:51:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:22 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x14, @any=0xffffffff}, 0x10, 0x0) [ 758.224964] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 758.233744] XFS (loop5): Log size out of supported range. [ 758.239368] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 758.253231] XFS (loop5): Invalid block length (0x1) for buffer [ 758.259427] XFS (loop5): empty log check failed [ 758.264178] XFS (loop5): log mount/recovery failed: error -12 00:51:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="000000249057e90000000000000000"]) [ 758.301552] XFS (loop5): log mount failed 00:51:22 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x400000000000000, @any=0xffffffff}, 0x10, 0x0) 00:51:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:22 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="43e829f572789b6a59d3578cb4f38439c7c91849f34f95"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000280)={{0x9, 0x2, 0x3, 0x400, 'syz1\x00', 0x7}, 0x0, [0xff, 0x100, 0x85a1, 0x7, 0x1, 0x2, 0x1, 0x1, 0x65, 0x3, 0x6408, 0x800, 0x0, 0x7, 0x80000000, 0x80000000, 0xff, 0x8, 0xc6, 0x800, 0x40, 0x7fffffff, 0x1, 0x9, 0xdb, 0x6078000000000, 0xf8b2, 0x4, 0xfffffffffffffff8, 0x8001, 0x1, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x80, 0x0, 0x100000001, 0x159, 0x287, 0x1000, 0x1f, 0x100, 0x5, 0x2543, 0xffffffff, 0x3b0b, 0x8, 0x1, 0x6, 0x80, 0x9, 0x2, 0x6, 0x3e, 0x1f, 0xfffffffffffffffd, 0x4, 0x4, 0x9, 0x5, 0x1, 0x0, 0x27b, 0x200, 0x2, 0x40, 0x19c, 0xff, 0x6, 0x6a0, 0x6, 0x48, 0x0, 0x20, 0x800, 0x0, 0x815, 0x2, 0x8, 0x7, 0x1, 0x12, 0x8, 0x75, 0x0, 0x5, 0x0, 0x8000, 0xfffffffffffffffa, 0x7, 0xfffffffffffffffc, 0x0, 0x0, 0x80000000, 0x1, 0x0, 0x1000, 0x734, 0xfff, 0x0, 0x38d, 0x401, 0x8, 0x9, 0x46b, 0x3, 0x0, 0x8, 0x80, 0x80000001, 0x4, 0x7fff, 0x6, 0xfffffffffffffffe, 0xc7e, 0x8, 0xd27, 0x1, 0x0, 0xf12, 0x3, 0x7c8e, 0x2, 0x0, 0x600000, 0x401], {0x77359400}}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 758.478060] XFS (loop5): Mounting V4 Filesystem [ 758.490971] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 758.499525] XFS (loop5): Log size out of supported range. [ 758.505216] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 758.563471] XFS (loop5): AIL initialisation failed: error -12 [ 758.578528] XFS (loop5): log mount failed 00:51:23 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000080)=ANY=[]) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x1, 0xc148b704ff4ca738}, &(0x7f0000000040)=0xc) read(r1, &(0x7f00000002c0)=""/178, 0xb2) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x8000, 0x16, 0x1, r1}) signalfd4(r1, &(0x7f0000000140)={0x7}, 0x8, 0x0) getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000001c0)=""/166, &(0x7f0000000280)=0xa6) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xfff, 0x402800) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0xb987}, 0x8) 00:51:23 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xe0ffffffffffffff, @any=0xffffffff}, 0x10, 0x0) 00:51:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:23 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:23 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000f3ff00a5ba00", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000080)={0x400, {{0xa, 0x4e22, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x7f}}, {{0xa, 0x4e21, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x4}}}, 0x108) mq_timedreceive(r1, &(0x7f0000000280)=""/217, 0xd9, 0xe48b, &(0x7f0000000000)={0x0, 0x989680}) 00:51:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe00000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:23 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000300)=0x80) bind$bt_sco(r0, &(0x7f0000000340)={0x1f, {0x1, 0xffff, 0xffff, 0x8, 0x0, 0x7}}, 0x8) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x52000) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={r4, 0x40}, &(0x7f0000000240)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 759.212769] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:23 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x4000000, @any=0xffffffff}, 0x10, 0x0) 00:51:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:23 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x3) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="000b0000000000004f2b35e56b040f72c531955f149148a3c179f29e8eae3068845188adf6a3c726a2a1f1cff5095163e7152ba61e3fc0db85be1ea7a7168271d06e4e008ae4743983c63a85324e98794307e4ca7161356724fc936b38303adc574b01ff52285a858fbbb48cda18a1e6549c55ce072b684507d8d7ab", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="a770cdaa7ff0ac05d519c367af"], @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES16=0x0, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYBLOB="fa742798dc0f7f5f48dc37a4aa35fb", @ANYPTR, @ANYPTR, @ANYRES64=0x0, @ANYPTR64, @ANYRES16=r1], @ANYRES64=r2, @ANYBLOB="d5e3f6368156a7d0ecbd44806a2920e1a60e83548187e03958fb49069926f60b070c6eee43052a745d3f3df4f9524a23fa2331ebc154f5a01e06f8391acd8828f9", @ANYBLOB="89758711e98ce5cf8a4cb7322dc169bb9490817b621e4c4e347f0c95bb40fa256e72e93b842ebe3dbd3b37dcbb121bfb33175fd3c512fb3233709bb98f51d82fa93b9b46eeb58dff9b263dcd5b29fb46af3041fec4a6201cef84f891bc441902e329a83d46fbc65149151a08a82edc6c20ce6ba2056c82876f3a91c1ebeca0248bc78cbfa3e2"]]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x8d) ioctl$KDSKBLED(r1, 0x4b65, 0x2) [ 759.257999] XFS (loop5): Mounting V4 Filesystem [ 759.267864] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 759.276354] XFS (loop5): Log size out of supported range. [ 759.281972] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:23 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000180)={0x1000, 0xa43, 0x8, 0x0, 0x94d, 0x9, 0x8, 0xfd, 0x4, 0x5, 0x85b, 0xfffffffffffffffb, 0x0, 0xd8e, 0x73e3, 0x1f, 0x9, 0xdc, 0x7}) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000100)=0x40, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000ffff00000000ddc47051e14096e9379a8e969eb5c5673f03b2e1512ddbdcdea156625da705cb8a8ad3e7ee5e9a1c62ff8cb4dcd4e60b89fddc0000000000000007e7137c0019a7643ae66cf8f4af07b346fcd6b6aa2af9926c5c17516700ef9f60bc4b579639cb56b2cb91a563b42239b0b0f939cb41314988823824af302064bfcf608186dcdea0166d67d16613df2a3bf8feb9eaed054e402b1a0c7c914f4a4da63a069ba3b4e2c25baacfcd9f55c034efc11493f63d00d3adeffe6263000000000000000000000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB], @ANYBLOB="0000000000000000ff0f0000ff7f0000"]) [ 759.324234] XFS (loop5): Invalid block length (0x1) for buffer [ 759.330343] XFS (loop5): empty log check failed [ 759.335087] XFS (loop5): log mount/recovery failed: error -12 [ 759.392906] XFS (loop5): log mount failed 00:51:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:23 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x20000000, @any=0xffffffff}, 0x10, 0x0) 00:51:23 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) setfsgid(r2) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)) 00:51:23 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x7, 0x0, 0x81, 0x0, 0xfffffffffffffffc}) [ 759.505380] XFS (loop5): Mounting V4 Filesystem [ 759.520080] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 759.528598] XFS (loop5): Log size out of supported range. [ 759.534213] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 759.546890] XFS (loop5): Invalid block length (0x1) for buffer [ 759.552959] XFS (loop5): empty log check failed [ 759.552976] XFS (loop5): log mount/recovery failed: error -12 [ 759.554063] XFS (loop5): log mount failed 00:51:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:23 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xffffffffffffffe0, @any=0xffffffff}, 0x10, 0x0) 00:51:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:24 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) fsetxattr(r1, &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000080)='ppp1keyringZ\x00', 0xd, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={r1, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x4}) 00:51:24 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000000700)=[{&(0x7f0000000040)={0x27, 0x1, 0x2, 0x7, 0xfffffffffffffffa, 0x4d6, "599e9f7c4092139c550b9a1e6ded8916e0a2c1080d68a6a7a15ae734996d5fcf6434f4de5c4d177a6945446adc6a0124240691be09353d73ad4f50928907fa", 0x28}, 0x60, &(0x7f00000002c0)=[{&(0x7f00000000c0)="145a0eefa1cd82fc9ebac0da090b24a2aae8ecffab6584b64e423a69f406001c1bf25464dd654cf98927904dda2baab688cc0ee91e5c7962dccfc325f93bd0aa97ed091cf3315e83fc7d81109a2d1733ce0cc9df69afd2d6edb5978122520a77c25457c2b457dad835e58dcb5e92d510357577d8f3ca344cf02ac51700", 0x7d}, {&(0x7f0000000140)="2384f97e0f3204a69c9ab04404fc53e2271b2ea3ef31a2a074ac56640fcfb6f0abc0334bef40311f7bdd693ee7ec611c7569a1e75a4fbc0ab6f939aac7b31b84d2db58bdc9413e47a8dfcb964c0ea4eb9f58415874", 0x55}, {&(0x7f00000001c0)="cac2641cb3dc3646fd618ed6f5ae01550c6407a1cd5baf7b475454747ceccdb50236c080857060fb37f84ed51e", 0x2d}, {&(0x7f0000000280)="3253b6f1f5ca55a77c2c27cfef7bc368f0cd89e4b236c1f4b1705e8817e1e1afb318648d9d593cf99b38c5fb08", 0x2d}], 0x4}, {&(0x7f0000000300)={0x27, 0x0, 0x2, 0x6, 0x8001, 0xc543, "237389096fc58aa8a89cef5217f78234689b73f36ada7565b28d9592c82dc16d08be2ffda0b7c9e317636ce7254ba6d220a7145f0a92125611b8f099e41af8", 0x9}, 0x60, &(0x7f0000000400)=[{&(0x7f0000000380)="f51a02c3cb815990e2bbac5ce203f533c6f6325a7b0accb0fcb4d68f6469e998dad8f1823be9a5de44ca6f9f8eb18acd7518366a", 0x34}, {&(0x7f00000003c0)="692b46410a9050c5c74fdc7dc30db374a85bc3aba75580b3454be59c32aaf36acbddff57c02519db2d3d5c18e398ce79b6cc8c14079a", 0x36}], 0x2, &(0x7f0000000440)={0xf0, 0x10f, 0x76cad9eb, "04da48938f91f11bdd69950b5792218540b013e70c42eaeb70b762e17d30d7726acdbdba0d7f4f7576ba554a9f91e7552b2e18cac1ef8e457718546db96deb3078b6da4ef9dd82a5142f972cb458b18a530d21a6a05a31ec286e9c8f0f5c2fd94317da8e1cf0bd0f473468e5856dc6b30174dccec3f50fcbcb5c78bff7f89c2e4a42177395619b08054e0688141d18839ea4edd8b18119dbb235c6231f375ab7e71dd10a906198970e8e8ae7c4dae0c28ca40c3d7365afbcdff61f9323872f99ff7abed3045f7a6d289a2431ab7e68b7817e1e37ba0ad9b72b799c5215"}, 0xf0, 0x4800}, {&(0x7f0000000540)={0x27, 0x1, 0x2, 0x6, 0xe5, 0xa, "b0bec97d9682dd9be0079db16531a50bf8ac44cd512366f79a2e88cf8695bc78efad10469bebfeb635f1acc34020d0f37a8d04bfd571f24d9874afbb825e82", 0x25}, 0x60, &(0x7f0000000640)=[{&(0x7f00000005c0)="3da9e8af9869846432ab144399c59ff6b4cc399239072585343eb36ee5c4a7618a18c6d972f8939bd35c2904b743836743d39f130854620a7cfde9509bbb018b9c38ce85879b9c3b355f6cbe7b8f58754d9fc5c11f8ef705cf34b68176252930fe949c0c457cb0993851cea1553d8c2b9e8ebdf725f98c32891938", 0x7b}], 0x1, &(0x7f0000000680)={0x68, 0x103, 0x7, "f013a2edfdc99a5c7cdf35804fb35dd28342eab9149abb73d7d67e550be6c42bbf7137b8540da567a0efd99f79539d607d9b5e8337e56848ef47268bffbdea40a3180c651aea10bfa0132e60a8577a2f293f"}, 0x68, 0x10}], 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 759.851249] XFS (loop5): Mounting V4 Filesystem [ 759.868662] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 759.877124] XFS (loop5): Log size out of supported range. [ 759.882756] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 759.917140] XFS (loop5): Invalid block length (0x1) for buffer [ 759.923278] XFS (loop5): empty log check failed [ 759.928007] XFS (loop5): log mount/recovery failed: error -12 [ 759.936482] XFS (loop5): log mount failed [ 760.022709] XFS (loop5): Mounting V4 Filesystem [ 760.029229] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 760.037683] XFS (loop5): Log size out of supported range. [ 760.043289] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 760.055344] XFS (loop5): Invalid block length (0x1) for buffer [ 760.061424] XFS (loop5): empty log check failed [ 760.066153] XFS (loop5): log mount/recovery failed: error -12 [ 760.072850] XFS (loop5): log mount failed 00:51:24 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:24 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x7fffffffffffffff, @any=0xffffffff}, 0x10, 0x0) 00:51:24 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000413f27006fe2960900", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000040)={0x0, 0x3, 0x0, {0x77359400}, 0x5, 0xfca}) 00:51:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5455010000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:24 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d3, &(0x7f0000000000)) 00:51:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376638, 0x10800a, 0x0, 0x0, 0x0, 0x10000000000, 0x1000000000000000}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:24 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4880, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0x13, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="fcff060000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB], @ANYBLOB="263e7dcc000000000000000100000000"]) [ 760.248432] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:24 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xfffffffe, @any=0xffffffff}, 0x10, 0x0) 00:51:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xdc050000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:24 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="40000000008b6dda55", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000000)='veth0_to_team\x00', 0x4}) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x7, 0x7, 0x9, 0x0, 0x1, 0x0, 0x9, 0xfffffffffffff03b, 0x81, 0x4658, 0x5, 0xfffffffffffffc01, 0xfff, 0x5, 0x80000001, 0xffffffffffffff22, 0x7, 0x4, 0x1f, 0x5, 0x2b, 0x7f, 0xffff, 0x5872, 0xfffffffffffffffa, 0x80, 0x8, 0x55f9, 0x3, 0x7, 0x47, 0x200, 0x8000, 0x2, 0xf4f, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x142, 0x7, 0x3ff, 0x3, 0x7, 0x8, 0x4}, r3, 0x0, r1, 0x1) [ 760.319673] XFS (loop5): Mounting V4 Filesystem [ 760.328748] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 760.337303] XFS (loop5): Log size out of supported range. [ 760.342940] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:24 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x6}, 0x8) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000080)={0x0, 0x2710}, 0x10) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000200000000000000000000000000"]) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000000c0)=0x1f, &(0x7f0000000100)=0x2) [ 760.407332] XFS (loop5): Invalid block length (0x1) for buffer [ 760.413516] XFS (loop5): empty log check failed [ 760.418281] XFS (loop5): log mount/recovery failed: error -12 [ 760.445614] XFS (loop5): log mount failed 00:51:24 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xfeffffff00000000, @any=0xffffffff}, 0x10, 0x0) 00:51:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:24 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x0, 0x7, 0x2, 0xfffffffffffffffd}, 0x7, 0x10, 0x5}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x89a, 0x7, 0x7}) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="e68fe539df3ab2af9f531eec39c5f6fadb2e6e146dafeb50be11288a92113e20f5a04fdad73abb95a5b90a0ff0ce6adc93180dea7b3549872c62c0015d72c3252b4e1ba1b3f7266b1b673e2f94f47eeb25c2eeaa3beec0c9ec4f9a856b95ca1c767c1b2b32a4c3f90194cfc0d04dd7f67c27023965d7c400bb2ef27d4610a9af7b7c03183b04886d4f221029882817b33f01dee1c1b16efaaf6e776e649b5832a7cd23d93751543302d9adb54162cb6ef676e5849515c9dbb5dc171f38dbac6a4d2d973c1e97f680d9531cd046c0790de0bd43963d28be74f07436c3fa56322cd51203c2cdaffb98d746975f7b84863f4d84ecb0370456", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 760.602954] XFS (loop5): Mounting V4 Filesystem [ 760.622583] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 760.631060] XFS (loop5): Log size out of supported range. [ 760.636673] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 760.688181] XFS (loop5): AIL initialisation failed: error -12 [ 760.694995] XFS (loop5): log mount failed 00:51:25 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:25 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="e0ff000000000000000000000000ecf4c03bf0181413266b2411a6d7358100d965163d25cb5177222d091fc1a711b05b2697a8e6ab5429c4f00000000000"]) 00:51:25 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x1400000000000000, @any=0xffffffff}, 0x10, 0x0) 00:51:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:25 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$TIOCCBRK(r1, 0x5428) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530f9", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc900000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x180, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x1) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) timerfd_create(0x7, 0x80000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 761.288337] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:25 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000008916, &(0x7f0000000480)="2940e1311ffb1609786710641a357ae48f8a19530e6126325b3b381a0dfd15cb0a5893a09a806d41c5f65f1f1d1b30d4f55feb321a26f24b39bb5f41838bf9f7ca81924381376260b1e43b9dfa1edc2a772de1e5046ad95c165d876c95c84369108dfad14b9e7f129050afa8986be80321213c903e454602ef0a168f5e89b0b5851e3b601d37c7b8b4593af2c71a4bc618cfba2d") r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) keyctl$get_persistent(0x4, r4, r3) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="13cd0b444d10e981bf2d685085f147ecc31fa5b9edffa9815e41070000005af2e0f9c5"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:25 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f0000000040)=""/82) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) r2 = add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$update(0x2, r2, &(0x7f0000000180)="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", 0x1000) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0)=0x3, 0x4) 00:51:25 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xffffffe0, @any=0xffffffff}, 0x10, 0x0) [ 761.350152] XFS (loop5): Mounting V4 Filesystem [ 761.363651] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 761.372197] XFS (loop5): Log size out of supported range. [ 761.377816] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 761.445418] XFS (loop5): Invalid block length (0x1) for buffer [ 761.451691] XFS (loop5): empty log check failed [ 761.456445] XFS (loop5): log mount/recovery failed: error -12 00:51:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:25 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x1, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000487cd89bbc9d00a94f16b176849e6f29e7027703a6eb2059062da5896ac44aa9fdaf3f2a7f0389d5ddf82dc1e3e234951ee9475d6cc2847fa68c805ceb0461552aac8bd3f0f3828ec59b5f206c8043303a3e9765ed45e368a5fc76b83ca0f1ec7d4b93132fa4c700596d32c214ad62fa000000000000f56cc14d6e20de671badd06ff5e56f614dd6a951563cab363fe021ee0e20ddc3dc8d64da0be3678a8b2980ccf31431c247074d1d88510d6a", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 761.491148] XFS (loop5): log mount failed 00:51:25 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0x7dfffff}, 0x10, 0x0) 00:51:25 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0x85, 0x1, 0x80000001, 0xa3, 0x5, 0x100000001}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 761.672622] XFS (loop5): Mounting V4 Filesystem [ 761.693517] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 761.702179] XFS (loop5): Log size out of supported range. [ 761.707821] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 761.721320] XFS (loop5): AIL initialisation failed: error -12 [ 761.738102] XFS (loop5): log mount failed 00:51:26 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:26 executing program 1: socketpair$inet6(0xa, 0x0, 0x1ff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0xef, 0x4) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:26 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0x7dff}, 0x10, 0x0) 00:51:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:26 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa00000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 762.329487] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:26 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="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"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:26 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0x3efff}, 0x10, 0x0) 00:51:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 762.417727] XFS (loop5): Mounting V4 Filesystem 00:51:26 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={r1, 0x7, 0x1, 0x52b0, &(0x7f0000000040)}, 0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 762.443091] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 762.451645] XFS (loop5): Log size out of supported range. [ 762.457283] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 762.492156] XFS (loop5): Invalid block length (0x1) for buffer [ 762.498277] XFS (loop5): empty log check failed [ 762.503077] XFS (loop5): log mount/recovery failed: error -12 00:51:26 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0x1f7fff}, 0x10, 0x0) 00:51:26 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="024e8f118da3accf", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$KIOCSOUND(r1, 0x4b2f, 0x9) [ 762.564309] XFS (loop5): log mount failed 00:51:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:27 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'ip6gre0\x00', {0x2, 0x4e22, @loopback=0x7f000001}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="1f046346947e6bede1b328f2b72ea4ecfd4a0605064d494f5d4e503e8ff8"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 762.674665] XFS (loop5): Mounting V4 Filesystem [ 762.681707] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 762.690234] XFS (loop5): Log size out of supported range. [ 762.695888] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 762.708492] XFS (loop5): Invalid block length (0x1) for buffer [ 762.714654] XFS (loop5): empty log check failed [ 762.719408] XFS (loop5): log mount/recovery failed: error -12 [ 762.728937] XFS (loop5): log mount failed 00:51:27 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:27 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffff01f7}, 0x10, 0x0) 00:51:27 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x84040) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d3, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES64=r0, @ANYRES32=r0, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR, @ANYPTR, @ANYPTR]], @ANYRES16=0x0]) 00:51:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8035], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:27 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @empty, 0x6}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000080)={0x400, {{0xa, 0x4e24, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x20}}}, 0x88) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffff9}, 0x4) r3 = socket(0x40000000002, 0x2000000000000003, 0x2) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000000140)={@remote}, &(0x7f0000000280)=0x14) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='bond0\x00', 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}}}, &(0x7f0000000380)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r4, 0xbca2}, &(0x7f0000000400)=0x8) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000500)={@rand_addr, @multicast1, 0x0}, &(0x7f0000000540)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'ip6_vti0\x00', r5}) sendto$unix(r3, &(0x7f0000000080), 0x640, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x63) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000000000300000000"]) 00:51:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c65301e", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xcc00000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0xffffffffffffff4c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r2 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3, 0x400000) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180), &(0x7f0000000280)=0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000800)=""/4096) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'bpq0\x00', {0x2, 0x4e20, @loopback=0x7f000001}}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r2, 0x7, 0x3}, 0x14) 00:51:27 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0xc8, 0x4) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040), 0x4) [ 763.363885] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:27 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffff0fbf}, 0x10, 0x0) 00:51:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f00000001c0)={0x0, 0x10001, 0x40, &(0x7f0000000180)=0x7fff}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 763.476195] XFS (loop5): Mounting V4 Filesystem 00:51:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8847], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:27 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffff}, 0x4, {0xa, 0x4e23, 0x6, @loopback={0x0, 0x1}, 0x100000001}}}, 0x38) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xb) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x4) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000140)={@rand_addr, @multicast2, 0x0}, &(0x7f0000000180)=0xc) connect$can_bcm(r1, &(0x7f00000001c0)={0x1d, r3}, 0x10) [ 763.501337] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 763.509852] XFS (loop5): Log size out of supported range. [ 763.515509] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:27 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffff7dff}, 0x10, 0x0) 00:51:27 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="000000190000030000001f0007000000"]) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0xfffffffffffffff9, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}}}, 0x88) 00:51:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x689], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 763.574655] XFS (loop5): Invalid block length (0x1) for buffer [ 763.580868] XFS (loop5): empty log check failed [ 763.585816] XFS (loop5): log mount/recovery failed: error -12 [ 763.638811] XFS (loop5): log mount failed [ 763.749935] XFS (loop5): Mounting V4 Filesystem [ 763.770008] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 763.778562] XFS (loop5): Log size out of supported range. [ 763.784181] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 763.839315] XFS (loop5): Invalid block length (0x1) for buffer [ 763.845554] XFS (loop5): empty log check failed [ 763.850315] XFS (loop5): log mount/recovery failed: error -12 [ 763.858623] XFS (loop5): log mount failed 00:51:28 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:28 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xfbffff}, 0x10, 0x0) 00:51:28 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="8100000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:28 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 00:51:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xb00000000000000, @loopback={0x0, 0x1}}, 0x1c) [ 764.307763] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:28 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0x3e}, 0x10, 0x0) 00:51:28 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000000020000000000"]) 00:51:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 764.405202] XFS (loop5): Mounting V4 Filesystem [ 764.418801] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 764.427405] XFS (loop5): Log size out of supported range. [ 764.433079] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 764.493234] XFS (loop5): Invalid block length (0x1) for buffer [ 764.499406] XFS (loop5): empty log check failed [ 764.504169] XFS (loop5): log mount/recovery failed: error -12 00:51:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) readlink(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000340)=""/94, 0x5e) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000200)) 00:51:28 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 764.539374] XFS (loop5): log mount failed 00:51:28 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0x1f7}, 0x10, 0x0) 00:51:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2800], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:28 executing program 1: r0 = socket$inet6(0xa, 0x80000, 0x3) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000180), &(0x7f0000000200)=0x4) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000040)={0x7, 0x6, 0x5, 0xeff1, 0x100, 0x9, 0x9, 0xb7d0, 0x5, 0x3f}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x7, 0x10000, 0x4}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x8001, 0x0, 0x208, 0x7, 0x7, 0x70000000000, 0x10001, 0x8, r3}, &(0x7f0000000140)=0x20) 00:51:28 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4000}) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) [ 764.708749] XFS (loop5): Mounting V4 Filesystem [ 764.721070] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 764.729715] XFS (loop5): Log size out of supported range. [ 764.735362] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 764.788170] XFS (loop5): AIL initialisation failed: error -12 [ 764.796233] XFS (loop5): log mount failed 00:51:29 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xfffffffffffffff8}}, 0x39445bd3, 0x7fffffff, 0x2, 0x800, 0xfa3}, &(0x7f0000000180)=0x98) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="794d4730d05130b8d161428a0669723399ed96f20a7fd0def1ba378227aef3bc9a4473c6f2bd3a77a37237fd491800a944009476df35402455bbfe380769347cf2c539cfb67108aab4dd109ec784dae6726729d0cfed8ff043f78bffdb294b0cf59b2dda420e18832120150020a5077410a861927f795db562a8793be15aad548f9389dca3fe89563c867d6232e1bf0c6c5a4be96438e1f9f291"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:29 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xfbf}, 0x10, 0x0) 00:51:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:29 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x6002) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="00fdff02345b761b", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:29 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:29 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xd000000000000000, @loopback={0x0, 0x1}}, 0x1c) [ 765.248647] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:29 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffff003e}, 0x10, 0x0) 00:51:29 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="f90daf88b0d565390da6cf5e07607bf76874ef0fcb1c31a2cdfd23e56b6ef3d647cd1e209aa87315530a156c06989dfac231d48a6eadc2df43bdda11e87eebdab766f9213c42db38fccab4323984c9cb91a19aadacca807aa7d5082f32bb787202e8116db30242915d"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x81, 0x9, 0x1f}, {{0x0, 0x7530}, 0xe9, 0x0, 0x5}], 0x30) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000100)=r0) r1 = getgid() setgroups(0x1, &(0x7f0000000040)=[r1]) 00:51:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 765.346184] XFS (loop5): Mounting V4 Filesystem [ 765.354118] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 765.362619] XFS (loop5): Log size out of supported range. [ 765.368252] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 765.435081] XFS (loop5): Invalid block length (0x1) for buffer [ 765.441226] XFS (loop5): empty log check failed [ 765.445980] XFS (loop5): log mount/recovery failed: error -12 [ 765.459013] XFS (loop5): log mount failed [ 765.551731] XFS (loop5): Mounting V4 Filesystem [ 765.562623] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 765.571111] XFS (loop5): Log size out of supported range. [ 765.576774] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 765.594982] XFS (loop5): Invalid block length (0x1) for buffer 00:51:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2000, 0x0) socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x42, &(0x7f0000000180)="295ee1311f16f4776710708db58061521b8164277946606fbbeb14fc4632eccf6b94f4a644351f5c829a2e6333c6d92889") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:29 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ftruncate(r2, 0x200) 00:51:29 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffff3e}, 0x10, 0x0) 00:51:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:30 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) arch_prctl(0x0, &(0x7f0000000040)="510a682686c5d844da23822d21c219ecfb9caaa8eef52c4ea987ef4eac7fdb9a9bfc3dc67e2aca1889b751e1c49c2a49dc29898fb4881b24f93cfa92816f9d6b9cbc272bf9ec0fdf83e910173774b0208258a63adb81e497d05f64df4dbdaa5149b7033af230e86273e5c6ee177e21b9") r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@dev, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 765.601221] XFS (loop5): empty log check failed [ 765.606163] XFS (loop5): log mount/recovery failed: error -12 [ 765.618508] XFS (loop5): log mount failed 00:51:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:30 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xffffffffffffffe0}, 0x10, 0x0) 00:51:30 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200000, 0x60) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000140)=0x10) r2 = fcntl$dupfd(r0, 0xffffff7ffffffff0, r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x81}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e20, 0x3f, @mcast1={0xff, 0x1, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="e373ddb55bffa974074980fca1a5f47018e15a70f6d531be7ba396404f98d7c3a692d0b548633f8a9a6444c94916bb4bc5c77dff23260dcd539305cccc204bcc5461e512080fd8805b88367bd702b1b3e998b85c621ca8720c55b8d5fc09587cb2b9ff6c"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:30 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x900000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:30 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9bc, 0x800) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0x7) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xea, "6c5ec74f16b258a9dc867325cbcb7fccb14871eeac8a30a987c0856a8ef9db8fe001a530994f1384f7185a628dbfaddb44ffcb3ca117d1b037204139934cbec5f0022f0c44f7587afe1cb78b3ef0e78aa1ed85d523b3c3ea1d0f8766e1a5db239f7f5871e3bf7942854401ab95a7fe1d7f32924d7ad9062b1846f8f80848dde05e20288a905f28d35624d59f311bb866e86208800a3a980151142f34123ffb2ba3fa6fe5444bf705859a3be6f3b6a8633efddbfaefc1fead034a37db6f0907d156fa67349f38f9bfe6a41167d5ba44e51525e5c0757fbf9bbd8740df688b54b54c0fc456f4f5981cefa4"}, &(0x7f00000001c0)=0xf2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x80}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={r2, 0x20, 0x900000000000000, 0xffff, 0x6, 0xa41, 0xffff, 0x1000, {r3, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0x0, 0x1, 0x26, 0x6, 0x7}}, &(0x7f00000003c0)=0xb0) r4 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x800448d3, &(0x7f0000000000)) syz_mount_image$iso9660(&(0x7f0000000400)='iso9660\x00', &(0x7f0000000440)='./file0\x00', 0x1f, 0x4, &(0x7f0000000740)=[{&(0x7f0000000480)="163dcb10d6aee22103fef6d103a131a77ce1c5812a139001d3763ff29f3ba6a924d08859cad4c226d7567c04b46f837f766b7bbe9f6a8c83d6a4c361b550166725712b81081c2faa193e77a52f7f01b59864d66d911e5162647f2dfb04a41406eea975caceef7dc52b843b37c46aee98dd95610ae8e5d5b175cf2522fb6f9f53ba61eceeecb052eb810196b06902bf37c18f00e470b13223125b84ba354c641ef4602e9a0011635f836edf5436d7", 0xae, 0x2}, {&(0x7f0000000540)="f1cd5b65d795be65620ab9198023b544d0696c5dee2bbc293bafc4f1dc77737e4a34388ebf4ef29c2a7b84d3231b4b510e6f83d7e96a74f6c21a0abbbcabaa0344e3c60b049261d6d1bb0af137f81c81a167278b498ebea3cc7c132b7a960a7d59479c8eab34a87d91880cc0a15771a582d0442950e6fa370af99e3469d1accd589510643ea907b425f6a816cc34306cc1ce77d07a2e1ec17d6ddb55580dfccd6e8df2535ddd2995b5b6e6e35a738775edea903522ddc2b33f054faaadecc6f4fc613df89e32af547ebc62f6e0ba75bf2a116f66119da37b46d10fd06e72c8d551f5315d261a02e8c49936", 0xeb, 0xfff}, {&(0x7f0000000640)="766e09610a55713257d59dc36c98dc0c5320811ce29f6db20446fcffcae65901fa9ed154a50974718fd3c409cb69b62ae1dcaec779b17b8e2d7c312cc08d0e8b2c84586be2412162dd2a529be5f4e459b0a23ee0ab535443000a6dec088eb8e69d76a7672340a2483a78c0daa0db96208020ccc6501744aa6f7a6cc4caeb3cfcff0029228c7df580af4ce34b012fc77609397e30bf53", 0x96, 0xe232}, {&(0x7f0000000700)="85d50becbf96fa16f348e077d0443665ade5417428afdd1cf293241ed27b50aef55253af2c36", 0x26, 0x81}], 0x2000, &(0x7f00000007c0)={[{@nocompress='nocompress', 0x2c}]}) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) [ 765.851131] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 765.864517] XFS (loop5): Mounting V4 Filesystem [ 765.871333] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 765.879823] XFS (loop5): Log size out of supported range. [ 765.885474] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 765.918352] XFS (loop5): Invalid block length (0x1) for buffer [ 765.924666] XFS (loop5): empty log check failed [ 765.929411] XFS (loop5): log mount/recovery failed: error -12 [ 765.937389] XFS (loop5): log mount failed [ 766.086392] XFS (loop5): Mounting V4 Filesystem [ 766.098777] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 766.107361] XFS (loop5): Log size out of supported range. [ 766.113009] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 766.132588] XFS (loop5): AIL initialisation failed: error -12 [ 766.139937] XFS (loop5): log mount failed 00:51:30 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:30 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3, 0x1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000140)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={0x7fff, {0x2, 0x4e22, @multicast1=0xe0000001}, {0x2, 0x4e21, @rand_addr=0x1}, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x8, 0x9, 0x80000001, 0xfffffffffffffffa, 0x1000, &(0x7f0000000040)='gretap0\x00', 0x8, 0x0, 0x1}) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:30 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xe0ffffffffffffff}, 0x10, 0x0) 00:51:30 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000080)={0x1, 0x7, [@random="d5fe58cb5d39", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xb}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xf}]}) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, r3, 0x400, 0x70bd29, 0x25dfdbfb, {0x7}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x30}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x18}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x44000}, 0x4054) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x40000000000, 0x9, 0x1, 0x70c4f3cd, 0x65, 0x3daa, {0x0, @in6={{0xa, 0x4e20, 0x37fa, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}, 0x6, 0x8, 0xff, 0x7fff, 0x5}}, &(0x7f0000000380)=0xb0) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={r4, 0xbaa}, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000180)={0x1000, 0x80, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'sit0\x00'}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:31 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xfeffffff}, 0x10, 0x0) 00:51:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:31 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="009c75fefd27552f00e7e293000000007b01000d9ae2b5616b1793b404f0d07886c2579bc1ceae0ab8cbdfd9493134018b53fe9d29f5257837a7bcb92021654d5e3c14cfd208dd8520c4577507534579ed9d06e35c9835cd373dbee8ab32774c7eff93f40d75f90f3470bf8b4eda801d7f79c6d85a6f364ff7b2221cb021c8ed5d2c18d1310da6bbfc9fcefe5010e9710f6fcf657060665d3fd0d6921946f9eee74a4c98e4676557c61cd9bc28ac00", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:31 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c, 0x80000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="64d8b850446bff14250dc63f64f3990e", 0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000100)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:31 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xcc00, @loopback={0x0, 0x1}}, 0x1c) 00:51:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x90, r1, 0x118, 0x70bd28, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x4}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x4}}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x82}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x200}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xbb4b}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x332}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffffd}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000440)=@buf={0x9d, &(0x7f0000000380)="ab43a290fa38d58c97ae4892ed65a5607c88b7d0183d5fa317c2b0a2b92952f4017038e8ccccd416da7709e1750daefe3f601a463d39f7a85ee862106fe22f4fec1ff375b96c077ce7dcfad8350a66bec1c3349435d488811813a58de18ee706bc9322662764599428494dc5dd1a3fc0038314656ff8a7616942e5885bb6a6336de751fc7710b3edf5bc6cdbb0328094da66202c6eee365b8ba80826cd"}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x2) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000040)=0xffffffffffffff81) r4 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x800448d3, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000560285c4b6dcd951457d3ebf8877b8e8fa45639612bf9bce4cd9e0c706045708d26983cfdc4584d0abdc7062c66f71e95c6bca45a00897027d1f1bc8344c", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 766.888540] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:31 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xe0ff}, 0x10, 0x0) 00:51:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:31 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[{0x4, 0x80}, {0xa, 0x7}, {0x4, 0xffffffffffff0001}, {0x2, 0x3}, {0x8, 0x1}, {0x0, 0x81}], 0x6) r2 = fcntl$dupfd(r0, 0x0, r0) dup2(r0, r1) flock(r0, 0xf) ioctl$KDSETMODE(r2, 0x4b3a, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[]) fstatfs(r1, &(0x7f0000000140)=""/56) getsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) [ 766.979067] XFS (loop5): Mounting V4 Filesystem [ 766.996398] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 767.004933] XFS (loop5): Log size out of supported range. [ 767.010599] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 767.100753] XFS (loop5): Invalid block length (0x1) for buffer [ 767.106996] XFS (loop5): empty log check failed [ 767.111755] XFS (loop5): log mount/recovery failed: error -12 [ 767.149659] XFS (loop5): log mount failed 00:51:31 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x14000000}, 0x10, 0x0) 00:51:31 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[]) 00:51:31 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:31 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000040)=0x7) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 767.301899] XFS (loop5): Mounting V4 Filesystem [ 767.319508] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 767.328076] XFS (loop5): Log size out of supported range. [ 767.333687] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 767.391865] XFS (loop5): AIL initialisation failed: error -12 [ 767.399170] XFS (loop5): log mount failed 00:51:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r2 = socket(0xa, 0x1, 0x0) fchdir(r2) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)={0x0, 0xb1b4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000400)={r4, 0x737, "96c0c2e3021d0ad51f7e9a26000000000000ec3ce0379f66ee052b203c22aea5fb9b81d9ee7251"}, &(0x7f00000003c0)=0x2f) clone(0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) fstat(r3, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:32 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x14) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000140)={0x4, 0x0, 0x1, 0xffffffffffffff9c}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt(r2, 0x5411, &(0x7f0000000040)="c3ed371ceb1854b8da6fdf252f848d6e760a57999f857142c6027b65e45707112d74390a4a2c09c1ac3b438d616948400beae28e9ddb7bc730f19e1a94270dba1846aeb609038ed8be5d3a8f76f8a848cf11804b92be32ad965d8c14dd2da268d29a14c999215971d09e450c9caaa9f3bd03d05d57fa9723c7") ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000000000000000000ae3b0d771e108bc77ac27a83b2867e89c015c349f94a11add9c7965265155846cf0102f7b879e70028e101"]) 00:51:32 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xe0ffffff}, 0x10, 0x0) 00:51:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8848], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc9, @loopback={0x0, 0x1}}, 0x1c) 00:51:32 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530f9", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:32 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xffe0}, 0x10, 0x0) [ 767.934968] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:32 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+30000}}) [ 768.023259] XFS (loop5): Mounting V4 Filesystem [ 768.028812] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 768.037349] XFS (loop5): Log size out of supported range. [ 768.042978] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 768.063785] XFS (loop5): Invalid block length (0x1) for buffer 00:51:32 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_yield() getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000080)=0x97) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00e8e816488eb10f84a268c037c66300000000004eaf7f82d8efbf05ca7b50415c742903e00c431ca3d31830dec630cfb120384f28d859295905adaec1d8568cbc927481ac04432603dff4d7bad71971ed5b66b17fd364d44a9a8f50ffd9bd8b1860a9a7de584a8e2f6e404a863736b77b5c83e73f78762fb469910944be4bc54a9d9b7732f78b10342af70a627722e356da29fa926803212219a6ad02466ba58eaff1173f5effb85f8375ce4434b9b65ff17de147416cb42dfe44df52e096790afd0734709dda58888f8cb24aeb9ef837f4e86a5a"]) 00:51:32 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x7fffffffffffffff}, 0x10, 0x0) [ 768.069974] XFS (loop5): empty log check failed [ 768.074731] XFS (loop5): log mount/recovery failed: error -12 00:51:32 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="590388e8f119cc963b52b3ef775a972de9130f0f5d4408b1ed6799ee719298a692a2b4f770a4a122399944359b06dc212d0b0a526c1e6da01d71b543fa15b5bf766c746234af28595496690db6398b860b056cd8358392629036f25d191587"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000001c0)={{0x88, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e23, 0x1, 'wrr\x00', 0x17, 0x4, 0x3f}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e24, 0x0, 0x9, 0x20, 0x8}}, 0x44) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000100)=""/160, &(0x7f0000000040)=0xa0) [ 768.134497] XFS (loop5): log mount failed 00:51:32 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:32 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x4) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000280)="66ee0d3f76bcb5e88395813eff1126f0992fabc1d651fc9893bde187e1ee2bd235b6f7e7d6fc553704dcca90d45f754dce9b6ac5047775989c4411fe247fde5a9060652af0397b895ac5b223d1612a2b3532d8fa528910742bacb0448c92bafb00e96b4bf91616df02e5670bf3fe37b5668ef8855a03ef5b467c7188ddb5ea62370300a177609c00000000000000000057a310992eb03bd801cdde0000") ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000000000000000003"]) prctl$setendian(0x14, 0x100000000000002) [ 768.285412] XFS (loop5): Mounting V4 Filesystem [ 768.293307] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 768.301771] XFS (loop5): Log size out of supported range. [ 768.308393] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 768.387418] XFS (loop5): AIL initialisation failed: error -12 [ 768.397475] XFS (loop5): log mount failed 00:51:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/28, 0xa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:33 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x2000000000000000}, 0x10, 0x0) 00:51:33 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='.\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="000000000000ecffffff000000000000"]) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000100)={0x1f, {0xfffffffffffffbff, 0x110000, 0x2, 0x8, 0x1, 0xea9}}, 0x8) 00:51:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:33 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000000c0)=""/38, &(0x7f0000000100)=0x26) r2 = fcntl$dupfd(r0, 0x0, r0) arch_prctl(0x1006, &(0x7f0000000040)="ff8f4b36c88809cf2dfd4981d9591e8fc23fe71e7e0d4c6cbb0116ea34ed93064e4ad50091a7daeba33a338c631e15887cd5c33d4331ae55ccf56922233a57fa672e4eb30947157bab15cc80a69ead068d3a") ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 00:51:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c65301c", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xff00000000000000, @loopback={0x0, 0x1}}, 0x1c) [ 769.017494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:33 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0xf) 00:51:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:33 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x400000, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:33 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xffffffffffffff7f}, 0x10, 0x0) [ 769.086261] XFS (loop5): Mounting V4 Filesystem [ 769.099710] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 769.108286] XFS (loop5): Log size out of supported range. [ 769.114071] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:33 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x200000) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000180)={{0x1d, @local={0xac, 0x14, 0x14, 0xaa}, 0xf46, 0x4, 'dh\x00', 0x0, 0x1ff, 0x44}, {@loopback=0x7f000001, 0x4e22, 0x4, 0x7ff, 0x7ff, 0x3}}, 0x44) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 769.177415] XFS (loop5): Invalid block length (0x1) for buffer [ 769.183576] XFS (loop5): empty log check failed [ 769.188331] XFS (loop5): log mount/recovery failed: error -12 00:51:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 769.237558] XFS (loop5): log mount failed 00:51:33 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:33 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x4c) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x74, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0xd9}, @in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}, 0xfffffffffffffff9}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xfff}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0xfffffffffffffffc}, 0x8) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0071fc5d50f54600000000000000c8000000"]) 00:51:33 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x1400000000000000}, 0x10, 0x0) 00:51:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 769.366665] XFS (loop5): Mounting V4 Filesystem [ 769.372416] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 769.380879] XFS (loop5): Log size out of supported range. [ 769.386512] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:33 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040)=0x8, 0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140), 0x163) fcntl$setflags(r0, 0x2, 0x1) 00:51:33 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCCBRK(r1, 0x5428) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 769.434138] XFS (loop5): Invalid block length (0x1) for buffer [ 769.440259] XFS (loop5): empty log check failed [ 769.445008] XFS (loop5): log mount/recovery failed: error -12 [ 769.472448] XFS (loop5): log mount failed 00:51:33 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xffffffe0}, 0x10, 0x0) 00:51:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\b', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x806], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 769.699691] XFS (loop5): Mounting V4 Filesystem [ 769.724234] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 769.732741] XFS (loop5): Log size out of supported range. [ 769.738362] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 769.752879] XFS (loop5): Invalid block length (0x1) for buffer [ 769.759158] XFS (loop5): empty log check failed [ 769.763884] XFS (loop5): log mount/recovery failed: error -12 00:51:34 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) 00:51:34 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) linkat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x400) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="700f2dca23f1b2a71b3d245ec1d7997e130c480575e535b74d27eeb625a75c4aa5e4c3a72fcb888699218a30b857a320b1370e6a3353dcd82952517d04b649777dbf7c05c0394f9bdd596f18eec4b9355ace6e979ac623ced240e5a443dc8b7e825dc72f0ac761a0dfe3624225b737f80af4651923f1", @ANYPTR64, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR64, @ANYRES16, @ANYPTR64, @ANYPTR64, @ANYBLOB="4ba363adb61594a323692bfbaca4c44d3f826a06d43c3af04e2f87f1e9ed142e14e2ee42a6339dc8367fda5bd85e9ec7a1e5fae3e50e7531b624f28982373332484dccd0632984bb50ee6e9598daed6f52207b97e07727e72ee417d94ef52b188c903d027ee745d44859e4510eb0f75b7614236151082e6af6bab138dc5cf919656ff2aac69de693a765431bce4475fb34326c4684f75e92556cacf3", @ANYBLOB="d465cfda8b06f65ec6bcf90817f43fcfde7fd840127d0af8b860bf72179d1748f307ba85e3f22fc35a191e034313ac70cea366cdb9ed9a6f044e675cb09ceb20560277d68de390e8f1314fd80596c7d77271720000000000000000000000000000000094827dc38ed70900000000000033c27f1b34ebdc831ae6bbb3da4c982ea8a565d298a5aaf2de5470f1f768a70a473134364e0cc10500fe296559e7633d580b6af8a1ceadd74c884fa9f84f73d2da5d", @ANYPTR64], @ANYRES64], @ANYRES16=r1, @ANYBLOB="ab206ec6e4f665210d77b23003830bd2569f61804b284810899c80457a9ceb6489a24cfcfb4c7932bf8d17558ccd02ddd27f6ce14c563427f18f77ba3af59c5c0cf34f2c791d4850d2f975d7f3786e44fa6c8371082a23cd55503070e851ecff7450dd2bea3d2ad5f09b547b3124062bd261acf6cbd99b98bc55b53dc7411885cdc5c507bb06e62d25b33867ea411453d431939c1b02582035f1799bd105521cc0457cbed58f3d80cbd753fdccc7669c425781e548a86ebfb51fe241ab0b21ef3180e258c3d4b3c3", @ANYRES32=r1, @ANYRES64=r1]) 00:51:34 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xe0}, 0x10, 0x0) 00:51:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x11cc042500000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xdc05], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 769.771334] XFS (loop5): log mount failed [ 769.852199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 769.923235] XFS (loop5): Mounting V4 Filesystem [ 769.940386] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 769.948966] XFS (loop5): Log size out of supported range. [ 769.954582] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 769.978659] XFS (loop5): AIL initialisation failed: error -12 [ 769.992327] XFS (loop5): log mount failed 00:51:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:34 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:34 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="32e4097ab620f12b2c5b7ae508fc58fe988d1ee88f6f5df5e73db6a210e8f1362bd5bcba93997b9f2749ed596b519301000000a4dd9b6a221463b552989a7d9aabd9d12a9505ec8114ceb8cc2e9fdce0714f1c9c3af4be72e083ba4ed317f3ff85ccc360d13bc02abd456df0ec022f1e76920a39f66dbe79da5a4538a2ae2f73a4126529b2101f7c4306dc8e"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4640000011010100000000000003003e0000000000700000003800000054020000040000008b0d200002000800000001000000000007000000050000000101000000000000090000000100000000000000080000000700000000000080000800007fffffff0060000002000000050000001f000000deebd72d356bb2672c5e8b989bd600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x586) 00:51:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c653003", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xce00, @loopback={0x0, 0x1}}, 0x1c) 00:51:34 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x400000000000000}, 0x10, 0x0) 00:51:34 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() ptrace$getenv(0x4201, r2, 0x7fffffff, &(0x7f0000000100)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r3, 0x4) 00:51:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6488], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:34 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x4000000}, 0x10, 0x0) [ 770.407568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:34 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 770.476753] XFS (loop5): Mounting V4 Filesystem [ 770.489206] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 770.497752] XFS (loop5): Log size out of supported range. [ 770.503400] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:34 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="97d670879e28f017e04fed283af9be46a55e6f67d063bf7820c02a5e78e70a1401", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 770.525659] XFS (loop5): Invalid block length (0x1) for buffer [ 770.531845] XFS (loop5): empty log check failed [ 770.536609] XFS (loop5): log mount/recovery failed: error -12 [ 770.561622] XFS (loop5): log mount failed 00:51:34 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x110) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, [0x728f, 0x10001, 0xb28, 0xb0c, 0x1, 0x8000, 0x3, 0x8efa, 0x40, 0x2, 0x1f, 0x800, 0x2, 0x1, 0xfffffffffffffffc]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x1}, &(0x7f0000000240)=0x8) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000d517eac76fd00ca0b3", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:35 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x20000000}, 0x10, 0x0) 00:51:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 770.692304] XFS (loop5): Mounting V4 Filesystem [ 770.714396] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 770.722935] XFS (loop5): Log size out of supported range. [ 770.728552] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 770.825144] XFS (loop5): AIL initialisation failed: error -12 [ 770.833528] XFS (loop5): log mount failed 00:51:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/28, 0xfffffffffffffe28) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) pipe2(&(0x7f0000000040), 0x80000) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:35 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="3870c68117c95c7e7ffa8d78f9477f947ac30ceaaf0facbda565ba10a6a6ab") r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0000000000530ded14a637f91353f9a5c5775a4b46d3401d173e4e6f141ae70d"]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) 00:51:35 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:35 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x14}, 0x10, 0x0) 00:51:35 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000100)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="641028b4347132882fe555fe03ea2aba1e95e0dd132fbc83fbd1b06d7f04534cbfda02c382eab9ddf016f55c8be2d3a915e9989a8b0fac942c9acc2f5f88cc4f106ed0617bb7fb3ce43c8fe629c8d7caa010bbfd614c3d797e4dbe120f6b38e70925e55c1c619ed0832b4f53189610004768b518a74aac0568cf"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={r2, 0x9, "dd3f56a8fc750d9e87"}, &(0x7f0000000240)=0x11) 00:51:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfe80, @loopback={0x0, 0x1}}, 0x1c) 00:51:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:35 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x501f, 0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x7322, 0xbdd, 0x40, 0x100, 0x0, 0x2ba, 0x0, 0x1, 0x8, 0x6, 0xfff, 0x3, 0x7, 0x3ff, 0x1b36, 0xffff, 0x5, 0x0, 0x6, 0x6, 0x8000, 0x2d, 0x0, 0x0, 0x49a, 0x7ff, 0x800, 0x80, 0x72b4, 0xc17, 0x7e4a, 0xff, 0x3f, 0x1ba, 0x3, 0x0, 0x0, 0x3f, 0x4, @perf_config_ext={0x5, 0x7}, 0x11008, 0x6, 0xf11, 0x7, 0xfff, 0x1ff}, r2, 0x4, r3, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x7, 0x0, 0x800b, 0x87d0, 0x401, 0x4, 0x2, 0x1, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000240)={r2, @in6={{0xa, 0x1, 0xfd1, @mcast1={0xff, 0x1, [], 0x1}, 0x1}}}, 0x84) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000180)={0x20, @tick=0x7f, 0x2, {0x100000000, 0x5}, 0x80000001, 0x2, 0x2}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:35 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x4}, 0x10, 0x0) [ 771.455052] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:35 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000180)) linkat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000300)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000340)=0x7e, &(0x7f0000000380)=0x1) r4 = getgid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x3, 0x1, 0xacf2, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x15) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={r2, r3, r4}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000480)={0x3, {{0x2, 0x4e23, @loopback=0x7f000001}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x108) r5 = fcntl$dupfd(r1, 0x0, r1) fcntl$setownex(r0, 0xf, &(0x7f00000002c0)={0x1, r2}) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 771.546887] XFS (loop5): Mounting V4 Filesystem 00:51:35 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x401, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="01cbe597eae55afeffffffffffff", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 771.581882] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 771.590415] XFS (loop5): Log size out of supported range. [ 771.596047] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:36 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xfffffffe}, 0x10, 0x0) [ 771.631910] XFS (loop5): Invalid block length (0x1) for buffer [ 771.638090] XFS (loop5): empty log check failed [ 771.642821] XFS (loop5): log mount/recovery failed: error -12 [ 771.651644] XFS (loop5): log mount failed 00:51:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:36 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) munlockall() ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="b423b4ebd4c99218cb0d31295e8761b434a2a9b618007e12e970b4fe6db66be1d17bd1a3f6a88132e7e4c237265e4a21b9873508aec2ff5bba03ac76436a9b260ef4ee174e55906e471fbe4f1cc553c245291fc42394f6e04588b23ada35238cb5f445211d36b42bb234697d582c7a7f527118f6c2a7457b5e11199aa61354169cb4398f95a073b6e5324cc541"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:36 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0xfeffffff00000000}, 0x10, 0x0) [ 771.763985] XFS (loop5): Mounting V4 Filesystem [ 771.785184] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 771.793677] XFS (loop5): Log size out of supported range. [ 771.799277] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 771.868262] XFS (loop5): AIL initialisation failed: error -12 [ 771.875175] XFS (loop5): log mount failed 00:51:36 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x1000000000000}, 0x10, 0x0) 00:51:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:36 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = socket(0x10, 0xa, 0xfb6) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000100)={0x0, 0xfffffffffffffffe}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e21, 0x15, @dev={0xfe, 0x80, [], 0x16}, 0x7ff}}, 0x8174, 0xd3, 0x4, 0x4, 0x2}, 0x98) r3 = fcntl$dupfd(r0, 0x0, r0) accept4$inet(r3, &(0x7f0000000080)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x80800) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) 00:51:36 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$sock_bt(r0, 0xdd1f, &(0x7f00000000c0)="bea1dde645eab0ed520fe2834601dcc1fadc8c4029f03122f81d4e1ef2f91ba778a7f461f1a90675cac3e7699bdb3dbc32e72e70156b7fca1c090a9d14f2719394e04668fa85eed0fa373a72f452f1b99002ca3085cb64e5767bfc235795b23b4e271ebdbd3a08779b223151041f55f0b72b7c946693d2f2") r2 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfaf2, 0x621, 0x7f, 0x4, 0x0, 0x3, 0x10000, 0x5, 0x4, 0x5, 0x1, 0xca, 0x401, 0x3e00000000000, 0xfffffffffffffffb, 0x7fffffff, 0x690c, 0x5, 0x9, 0xde1, 0x6, 0x800, 0x1, 0x0, 0x3, 0x400, 0x20, 0x2b2, 0x3, 0xc4, 0x2, 0x0, 0x8, 0x3, 0x0, 0x1f, 0x0, 0x2, 0x4, @perf_config_ext={0x1f, 0x3}, 0x4, 0x8, 0x6, 0x2, 0x9, 0xfffffffffffffffd, 0x13e}, r2, 0x10, r1, 0x9) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) 00:51:36 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xff0f000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time, 0x0, {}, 0x0, 0x0, 0x1000}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 772.513107] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:36 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x1400}, 0x10, 0x0) 00:51:36 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000000000000000000b0737b55"]) 00:51:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 772.589078] XFS (loop5): Mounting V4 Filesystem [ 772.601884] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 772.610310] XFS (loop5): Log size out of supported range. [ 772.615929] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:37 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000280)={'tunl0\x00', 0x6}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x10000, 0xfffffffffffffffc, &(0x7f0000000040)="f492b34448a4c04f000f424ae21c08323d9488f30e45c2ec5baafb4709dc"}) sendto$inet6(r1, &(0x7f00000000c0)="2173385ac25f2a17eea01981cf89d542982391e5faf73bb698d5e676f28010d6c94a721ec0e69aaf5668ac880076d2cb93466b650c2f6eb3e27e9aacf6537de23c5d0a28f19caf1584e07115f3c3914c7ef8acf23c27d20a17caf5fa95ca95fdc229e18047d209679d292dc26591adf797e5eac1a037a00b15571c0577995fc64c5451306a1e0e9aac82c5dce766f0482cc36b5565ccc56c63f31bf93ad9c6ccd26b85c6c69589ca4674e9a745e63485dbf7bc9f4fb611ec0dd03143b900be7cd1cd337fa23a2fc4efb24716f7dee7e7cb1cd2cb53ba46", 0xd7, 0x0, &(0x7f00000001c0)={0xa, 0x8, 0x5, @dev={0xfe, 0x80, [], 0x17}, 0x101}, 0x1c) 00:51:37 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff, 0x2000}, 0x10, 0x0) 00:51:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:37 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="8c726007def5da7ccbe16205ba5d63c923ff0d0260d861ee1388"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 772.706162] XFS (loop5): Invalid block length (0x1) for buffer [ 772.712281] XFS (loop5): empty log check failed [ 772.717042] XFS (loop5): log mount/recovery failed: error -12 [ 772.752195] XFS (loop5): log mount failed 00:51:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:37 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0000000000f1338f76f800000000800000000000"]) socket$can_bcm(0x1d, 0x2, 0x2) [ 772.855475] XFS (loop5): Mounting V4 Filesystem [ 772.872298] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 772.880978] XFS (loop5): Log size out of supported range. [ 772.886587] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:37 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xfffffffe) 00:51:37 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa4, r2, 0x222, 0x70bd27, 0x25dfdbfc, {0xd}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1=0xe0000001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffde1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast=0xffffffff}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x880}, 0x0) getsockname$llc(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 772.911780] XFS (loop5): Invalid block length (0x1) for buffer [ 772.917932] XFS (loop5): empty log check failed [ 772.922708] XFS (loop5): log mount/recovery failed: error -12 [ 772.987649] XFS (loop5): log mount failed 00:51:37 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000000)={0x3, 0x0, 0x2000, 0x8, 0x973, 0x800, 0x0, 0x100000001, 0xbc, 0x9}, 0x10) r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="1b6a61ca1932e8ea04086a50dc", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:37 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x400000000000000) 00:51:37 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000280)={0xffffffffffffffff, r1, 0x245, 0x3, &(0x7f0000000040)="f7bb1886425a493f192c114a1afc56f3e0f6e5694c3a34efef01f3083517f4ff8584c18f1f7b1a2fdc7c8ab1d98083413de7541a22d48786f7d58fac287f33819951473cedf9dfd9bbe3677acf3b712e48ab463c613964f21f923a8b500698f68954c81005996ece66e7482f24634fbc826b3bafc8bde71bf339cddd95b30c906048e36d842130b393fef4e1be5136aa4c967a2cd80061c495654519786aee174a4a07f611bc6855d9b1cb6a0b875d06429c7798bd19581d4879fee2dfd9efb1638a20af2e9a5b505644cdc2f0cc4b61f805340d03b6e4be2056155b1b4038234d34c61d6942d17303dc329b382d577c5ae0ab3ea8a3f9", 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, "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"}) 00:51:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:37 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xf824010000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000180)) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x1de5, 0x80000) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={r3, 0x800}, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r4, 0x5}, 0x8) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 773.583213] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:38 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x800) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc2, &(0x7f0000000100)=""/141, &(0x7f00000001c0)=0x8d) r3 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000200)) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="000000007fffffff", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="27a02108b76a59e13c644381070bc0f227eb5a58b9b3e9a5723a338f8e672e41e3fce66326d4e52b03859b499b383fee3cdab2037104853fc11570e5aaecefc0210ac4641b847da1afa5e28346f89e71"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:38 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xffffffe0) 00:51:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 773.648498] XFS (loop5): Mounting V4 Filesystem [ 773.658133] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 773.666647] XFS (loop5): Log size out of supported range. [ 773.672258] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:38 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 773.702547] XFS (loop5): Invalid block length (0x1) for buffer [ 773.708701] XFS (loop5): empty log check failed [ 773.713442] XFS (loop5): log mount/recovery failed: error -12 [ 773.721793] XFS (loop5): log mount failed 00:51:38 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xffe0) 00:51:38 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) readlinkat(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/215, 0xd7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000000240)=0x8bea07bf8023c5b7) r3 = getegid() keyctl$chown(0x4, r0, r2, r3) r4 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000000)={0x80000001}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000080)) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x800448d3, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00010010000000572c2a950feedf2a44c7265775e96cf6000000000000000000f8ebb0525d81a7806ac2b245241f9191ee437be8"]) 00:51:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 773.849888] XFS (loop5): Mounting V4 Filesystem [ 773.865239] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 773.873724] XFS (loop5): Log size out of supported range. [ 773.879324] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:38 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xffffffffffffff7f) 00:51:38 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ff}) [ 773.935927] XFS (loop5): AIL initialisation failed: error -12 [ 773.949146] XFS (loop5): log mount failed 00:51:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\'', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:38 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x10, 0x9, &(0x7f0000000000), 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, "cb56136debee5a8c62d0913d180ebe8c53b99cf9b47308d1fc0cf85bcff6eb0081a4be7ee53f0c73644c8c71120fefaf29eb4b0d58d4a71fa4e9bb05e16a4141e91601e2f06e0ddd32e22e7d6373b0d774ea63fa946a7149478e94aa731b7b"}) ioctl$KDENABIO(r1, 0x4b36) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000040)) 00:51:38 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xfeffffff00000000) [ 774.179300] XFS (loop5): Mounting V4 Filesystem [ 774.185824] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 774.194287] XFS (loop5): Log size out of supported range. [ 774.199906] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 774.257568] XFS (loop5): Invalid block length (0x1) for buffer [ 774.263682] XFS (loop5): empty log check failed [ 774.268427] XFS (loop5): log mount/recovery failed: error -12 [ 774.275137] XFS (loop5): log mount failed [ 774.333246] XFS (loop5): Mounting V4 Filesystem [ 774.338913] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 774.347318] XFS (loop5): Log size out of supported range. [ 774.352891] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 774.365373] XFS (loop5): Invalid block length (0x1) for buffer [ 774.371467] XFS (loop5): empty log check failed [ 774.376227] XFS (loop5): log mount/recovery failed: error -12 [ 774.383163] XFS (loop5): log mount failed 00:51:38 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:38 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0, &(0x7f0000000000), 0x8000000000000, 0x0, 0x0, 0x8}) getegid() getgid() 00:51:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x58], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:38 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x101003) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x80000000, 0x5, 0x1}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:38 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xe0ff) 00:51:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:38 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x300000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000200)=""/236, 0xec}], 0x1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f00000000c0)={@any=0xffffffff}) ioctl$TIOCSTI(r2, 0x5412, 0x7) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet6_buf(r2, 0x29, 0xcc, &(0x7f0000000100)="7034ec846be01393c39bea4c49a70e21d0f6f64983b2c6966804ee74089bee560e920c8f54e702346faa1d63acc192b0da82ff6e531d48b8194be209a6e72980f76680d4898ffa14943f3aa27643af7d54e05b28546ad4ac891b89d738f19cc7bd55876673562c37de2b03e9b45f30d375c82a6f38e01a48c2079bb9449e8fdb65b1a96c087ce76d0c1cadd0e89ce33fe8e167fc198b05263c71fc872dfe7787c6a0629b628c1091c0bac5e08ef5a3bc82dee4e1ca11402fddde0b0cb1d34aaa9b3ea93aaadaced27fce59a2112dc0885d9e08bf7101a7ef3674d6e1fc499b9ce618f10432dc2d88353ee07628ba44ffce484b5e25141d", 0xf7) [ 774.624286] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:39 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x10001, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) ftruncate(r1, 0x4) io_submit(r2, 0x1, &(0x7f0000001640)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000440)='u', 0x1}]) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)) 00:51:39 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xe0) 00:51:39 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 774.706174] XFS (loop5): Mounting V4 Filesystem [ 774.716889] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 774.725376] XFS (loop5): Log size out of supported range. [ 774.731106] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 774.746520] XFS (loop5): Invalid block length (0x1) for buffer [ 774.752740] XFS (loop5): empty log check failed [ 774.757484] XFS (loop5): log mount/recovery failed: error -12 [ 774.766581] XFS (loop5): log mount failed [ 774.845517] FAT-fs (loop1): Directory bread(block 128) failed [ 774.866232] FAT-fs (loop1): Directory bread(block 129) failed 00:51:39 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x14) 00:51:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 774.897066] FAT-fs (loop1): Directory bread(block 130) failed [ 774.908457] XFS (loop5): Mounting V4 Filesystem [ 774.929846] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 774.938504] XFS (loop5): Log size out of supported range. 00:51:39 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000040)=0x100) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0000000000000000000000000000f808"]) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) socket$inet_smc(0x2b, 0x1, 0x0) [ 774.944170] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 774.962456] FAT-fs (loop1): Directory bread(block 131) failed [ 774.984599] FAT-fs (loop1): Directory bread(block 132) failed 00:51:39 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xffffffffffffffe0) [ 774.997407] FAT-fs (loop1): Directory bread(block 133) failed [ 775.025907] FAT-fs (loop1): Directory bread(block 134) failed [ 775.042986] FAT-fs (loop1): Directory bread(block 135) failed [ 775.056705] XFS (loop5): AIL initialisation failed: error -12 [ 775.066077] FAT-fs (loop1): Directory bread(block 136) failed [ 775.075872] XFS (loop5): log mount failed [ 775.081394] FAT-fs (loop1): Directory bread(block 137) failed [ 775.124924] attempt to access beyond end of device [ 775.130006] loop1: rw=2049, want=310, limit=128 [ 775.170614] attempt to access beyond end of device [ 775.175701] loop1: rw=2049, want=310, limit=128 00:51:39 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd00], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:39 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x1000000000000) 00:51:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xce000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:39 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00129c8fa22f8f7112b7cb18c44c2a0d944797a9625bc47d546c520baacbd4cf154a281ae36207131f2e5a0398e126e6112d8dc5fd9d61e394999dbad07f5379634063e27850e4"]) 00:51:39 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x80000, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x3, 0x6, 0x100}) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x10000, 0x0) accept4$alg(r3, 0x0, 0x0, 0x80000) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) [ 775.667862] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:40 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x280140, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000080)) recvmmsg(r0, &(0x7f0000000bc0)=[{{&(0x7f00000003c0)=@ax25, 0x80, &(0x7f0000000800)=[{&(0x7f00000004c0)=""/221, 0xdd}, {&(0x7f00000005c0)=""/103, 0x67}, {&(0x7f0000000640)=""/45, 0x2d}, {&(0x7f0000000680)=""/68, 0x44}, {&(0x7f0000000700)=""/53, 0x35}, {&(0x7f0000000740)=""/75, 0x4b}, {&(0x7f00000007c0)=""/20, 0x14}], 0x7, &(0x7f0000000880)=""/95, 0x5f, 0x100}, 0x5}, {{&(0x7f0000000900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000980)=""/65, 0x41}, {&(0x7f0000000a00)=""/253, 0xfd}], 0x2, &(0x7f0000000b40)=""/66, 0x42, 0x3}, 0xffffffffffffe271}], 0x2, 0x2001, &(0x7f0000000c40)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000c80)={'vcan0\x00', r2}) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000040)=0x8) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES64=0x0, @ANYBLOB="f9cb03e87b001a81721126a7da49ae8e8d5f696ca2094594acaaac4e782881a00a4d6c5aa7474f4ec083785d1829b8adeb44942329c33de97db64359c102d4e21e3e814338b1972038c4908799dda2bc028838792503b2645df7", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYRES32=r3]) 00:51:40 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x2000000000000000) 00:51:40 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000005ec0)={&(0x7f0000001800)=@alg, 0x80, &(0x7f0000004e00)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/206, 0xce}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/209, 0xd1}, {&(0x7f0000003a80)=""/153, 0x99}, {&(0x7f0000003b40)=""/177, 0xb1}, {&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/238, 0xee}, {&(0x7f0000004d00)=""/217, 0xd9}], 0x9, &(0x7f0000004ec0)=""/4096, 0x1000, 0x7}, 0x40000002) recvmmsg(r1, &(0x7f0000001780)=[{{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000040)=""/231, 0xe7}, {&(0x7f0000000140)=""/157, 0x9d}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f0000000380)=""/102, 0x66}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/150, 0x96}, {&(0x7f00000014c0)=""/9, 0x9}, {&(0x7f0000001500)=""/81, 0x51}, {&(0x7f0000001580)=""/242, 0xf2}, {&(0x7f0000001680)=""/27, 0x1b}], 0xa, 0x0, 0x0, 0x400}, 0x80000000}], 0x1, 0x40010000, &(0x7f00000017c0)={0x77359400}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 775.767594] XFS (loop5): Mounting V4 Filesystem [ 775.798905] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 775.807559] XFS (loop5): Log size out of supported range. [ 775.813238] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:40 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000100)={0x2, {{0xa, 0x4e22, 0xc4c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x20005}}}, 0xfffffffffffffce0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timerfd_gettime(r1, &(0x7f00000000c0)) pread64(r0, &(0x7f0000000040)=""/45, 0x2d, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'veth1_to_bond\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) 00:51:40 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x14000000) 00:51:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:40 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) [ 775.949021] XFS (loop5): Invalid block length (0x1) for buffer [ 775.955220] XFS (loop5): empty log check failed [ 775.959978] XFS (loop5): log mount/recovery failed: error -12 [ 776.032146] XFS (loop5): log mount failed [ 776.139783] XFS (loop5): Mounting V4 Filesystem [ 776.152683] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 776.161258] XFS (loop5): Log size out of supported range. [ 776.166887] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 776.190147] XFS (loop5): Invalid block length (0x1) for buffer [ 776.196336] XFS (loop5): empty log check failed [ 776.201082] XFS (loop5): log mount/recovery failed: error -12 [ 776.215884] XFS (loop5): log mount failed 00:51:41 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:41 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x4000000) 00:51:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x28], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:41 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) flistxattr(r0, &(0x7f00000000c0)=""/17, 0x11) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0x6) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000002c0)=0x10004) r2 = msgget(0x1, 0x300) msgrcv(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="4d13b598dbcdce3d1f9b5d5f31babea129fb003ff7dc5742cad6"], 0x8, 0x1, 0x3000) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x4, 0x1, 0x10}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000180)=0x4) bind$vsock_dgram(r0, &(0x7f0000000280)={0x28, 0x0, 0x2710, @host=0x2}, 0x355) 00:51:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x900, @loopback={0x0, 0x1}}, 0x1c) 00:51:41 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000280)={r0, r1, 0x6, 0x7, &(0x7f0000000040)="7adfda8af4d845a88e39ce31d0c44ff09f54e7aec5b988e40a597d10387587632eb790454811fe016e23d4459d582a7dae24d6ea71b5dbb98ac4f2d247172bea117990b366edc94d1b69b6c043bb62c1d994c84416600c355d15f0b497efa9adf445309757322ac78bddb721acc63b3a0b0461742a85ead520097c9bc429b35d999cb2d5d7a04341797d9d45635772df0a54a4d40c10319f8660726a2d0f153a65810bdc42e7447a57527a81128cb58411962099e64354c508fb2b5587c06c2a77156a276f2cb4", 0x5, 0x7, 0x1, 0xff, 0xffffffff7fffffff, 0xf40, 0x10001, "4c80c0e3fdfe7469a04ac8f9eb6f51db2c49078ca9f5887f6f8b0a4e7fbed9615e410ac179aeead03f1637326665c0917d5a7ec8249f9ae9100d3fa4e2d75b6637648cdf6097bffa6829985be8af929b28c5b4e5993be42a5e53bce77a0c43cc8ca02fe65d5463a1fb394d52627a1cc3c52ae3024765710aac5ee4e541d1568c0401974d4b7f16337bbd348d36a420c8a092e086958e127451495e4b9a7f80601c6bea1f197f83a4bfa372c8482a2673"}) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000140)) setsockopt$inet_dccp_buf(r2, 0x21, 0xcf, &(0x7f0000000400)="92c800ee561406dcf41db659bababb91dc96", 0xffffff59) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="13f67f577cfbea55ca7b214b8e4e3e14c8ef990d4db775a32523b8def8d65b0b6f2805e811f4ab1f2987a834ab4dc563d0961b065f2bde78cbe6238b56d70ed976939e23cc29dc482c47f5af67e55cb44d159ae320cc5833138dc1ceaf1b87c6855adbf78619dae980f9f8255bcad2418c9b12a7"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r3, 0x3c, 0x0, @in6={0xa, 0x4e20, 0x20, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x2}}}, 0x90) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:41 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x20000000) [ 776.730307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:41 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\aI', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 776.804956] XFS (loop5): Mounting V4 Filesystem [ 776.821243] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 776.829737] XFS (loop5): Log size out of supported range. [ 776.835340] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:41 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xe0ffffff) 00:51:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:41 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffff80, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x3) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$VT_RELDISP(r2, 0x5605) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080)=0x5, 0x1) lseek(r2, 0x0, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) [ 776.907012] XFS (loop5): Invalid block length (0x1) for buffer [ 776.913236] XFS (loop5): empty log check failed [ 776.917974] XFS (loop5): log mount/recovery failed: error -12 [ 776.924992] XFS (loop5): log mount failed 00:51:41 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x4) [ 777.060383] XFS (loop5): Mounting V4 Filesystem 00:51:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 777.084912] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 777.093460] XFS (loop5): Log size out of supported range. [ 777.099132] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 777.141130] XFS (loop5): AIL initialisation failed: error -12 [ 777.147852] XFS (loop5): log mount failed 00:51:41 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:41 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x7fffffffffffffff) 00:51:41 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20202, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x7, {0x4, 0x8846, 0x3, 0xffffffffffffff64, 0x800}, 0x4, 0x4}, 0xe) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x5}) 00:51:42 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x34d82342, 0x4, 0x8, 0x4, 0x49, 0x2, 0x6}, 0xc) 00:51:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530ff", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x700, @loopback={0x0, 0x1}}, 0x1c) 00:51:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x3) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000180)={0x0, 0x1f, 0xffffffffffffff80, 'queue1\x00', 0x6}) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:42 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xe0ffffffffffffff) 00:51:42 executing program 2: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x1, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) perf_event_open(&(0x7f0000000200)={0x2, 0xffffff56, 0x3e6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="fa7a29bd2af6632bab0106dc74c81fbbfdb53ed67e370ba17c58f1e9a844090d7bbbad29c851122f6a6ec688c7eeb65f8b64a1adc429c40b62e65b661e"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 777.728709] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:42 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x404, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="000000000000000027eca1170000070000000000409466afb2c483ca43d5b9aff79f1b8a268c0ca7b44b0f0dec93fca42fd77a67952b504c23fe2169c89c"]) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bpq0\x00', r2}) [ 777.776783] XFS (loop5): Mounting V4 Filesystem 00:51:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:42 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x1400000000000000) 00:51:42 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x2) [ 777.833715] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 777.842218] XFS (loop5): Log size out of supported range. [ 777.847954] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:42 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_sco(r0, &(0x7f00000000c0)={0x1f, {0x81, 0x2, 0x8, 0x2, 0x400, 0x9}}, 0x8) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="7b31946867e7c82b240e2edcbe82165e3d3c9c72e80fbb904101a96ad6a41c2368b9ea61ef85f0a580888aa1343bc71df4c43db2c185"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) write$cgroup_int(r1, &(0x7f0000000080)={[0x2b, 0x2b]}, 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="50f0d163dbe2ca0284bc57f8af9ea04c", 0x10) 00:51:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000100], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 777.931186] XFS (loop5): Invalid block length (0x1) for buffer [ 777.937334] XFS (loop5): empty log check failed [ 777.942144] XFS (loop5): log mount/recovery failed: error -12 [ 777.990763] XFS (loop5): log mount failed [ 778.107644] XFS (loop5): Mounting V4 Filesystem [ 778.122655] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 778.131150] XFS (loop5): Log size out of supported range. [ 778.136805] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 778.153523] XFS (loop5): Invalid block length (0x1) for buffer [ 778.159650] XFS (loop5): empty log check failed [ 778.164540] XFS (loop5): log mount/recovery failed: error -12 [ 778.171722] XFS (loop5): log mount failed 00:51:42 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:42 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x1400) 00:51:42 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5800], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:42 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f00000003c0)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r2, 0x1, 0x20000000000008, &(0x7f0000000000), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000200)={0x20000000, 0x8000000000013, 0x2, @thr={&(0x7f0000000080), &(0x7f0000000100)}}) close(r2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xffffff91, @loopback={0x0, 0x1}}, 0x1c) 00:51:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 778.563742] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 778.621702] XFS (loop5): Mounting V4 Filesystem [ 778.642871] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 778.651393] XFS (loop5): Log size out of supported range. [ 778.657050] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 778.695811] XFS (loop5): Invalid block length (0x1) for buffer [ 778.702010] XFS (loop5): empty log check failed [ 778.706787] XFS (loop5): log mount/recovery failed: error -12 [ 778.719844] XFS (loop5): log mount failed [ 778.771235] XFS (loop5): Mounting V4 Filesystem [ 778.776915] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 778.785542] XFS (loop5): Log size out of supported range. [ 778.791143] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 778.803725] XFS (loop5): Invalid block length (0x1) for buffer [ 778.809799] XFS (loop5): empty log check failed [ 778.814553] XFS (loop5): log mount/recovery failed: error -12 [ 778.821435] XFS (loop5): log mount failed 00:51:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x2000000000000, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:43 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB='\x00\x00 \x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="b44764a820c3b300000000fc1a6b7877ea023d8500000000"], @ANYBLOB="ff0400000000ff070000000000000000"]) 00:51:43 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x2000) 00:51:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530ff", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x493e0, @loopback={0x0, 0x1}}, 0x1c) 00:51:43 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x5, 0x1, 0x5, 0x0, 0x5, 0x1}}, 0x8) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpgrp(0x0) sched_getaffinity(r2, 0x8, &(0x7f00000000c0)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="c6c96bd822e104194ca929bc54ea88715a63d3471ab8f10fe9a59e2617ac659c039b2357652a7949b8329ce94a3c"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 778.975780] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:43 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xfeffffff) 00:51:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 779.048644] XFS (loop5): Mounting V4 Filesystem [ 779.056689] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 779.065237] XFS (loop5): Log size out of supported range. [ 779.070873] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 779.171951] XFS (loop5): Invalid block length (0x1) for buffer [ 779.178168] XFS (loop5): empty log check failed [ 779.182928] XFS (loop5): log mount/recovery failed: error -12 [ 779.203525] XFS (loop5): log mount failed [ 779.256114] XFS (loop5): Mounting V4 Filesystem [ 779.261996] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 779.270424] XFS (loop5): Log size out of supported range. [ 779.276064] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 779.293208] XFS (loop5): Invalid block length (0x1) for buffer [ 779.299332] XFS (loop5): empty log check failed [ 779.304110] XFS (loop5): log mount/recovery failed: error -12 [ 779.313583] XFS (loop5): log mount failed 00:51:43 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:43 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x1d47) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x4) listen(r1, 0x0) accept4$vsock_stream(r1, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:43 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000280)=0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x46000, 0x0) recvmsg(r1, &(0x7f0000000b40)={&(0x7f0000000440)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a00)=[{&(0x7f00000004c0)=""/173, 0xad}, {&(0x7f0000000580)=""/244, 0xf4}, {&(0x7f0000000680)=""/33, 0x21}, {&(0x7f00000006c0)=""/237, 0xed}, {&(0x7f00000007c0)=""/21, 0x15}, {&(0x7f0000000800)=""/92, 0x5c}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/189, 0xbd}, {&(0x7f00000009c0)=""/44, 0x2c}], 0x9, &(0x7f0000000ac0)=""/97, 0x61, 0x4}, 0x2000) getpriority(0x1, r0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @multicast2}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={r4, r5, r6}, 0xc) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)) 00:51:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfe800000, @loopback={0x0, 0x1}}, 0x1c) 00:51:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:43 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0008000000000008000000000000008e"]) [ 779.558951] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 779.592534] XFS (loop5): Mounting V4 Filesystem [ 779.598583] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 779.607084] XFS (loop5): Log size out of supported range. [ 779.612710] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 779.628160] XFS (loop5): Invalid block length (0x1) for buffer [ 779.634344] XFS (loop5): empty log check failed [ 779.639130] XFS (loop5): log mount/recovery failed: error -12 [ 779.665990] XFS (loop5): log mount failed [ 779.735457] XFS (loop5): Mounting V4 Filesystem [ 779.742256] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 779.750756] XFS (loop5): Log size out of supported range. [ 779.756376] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 779.769879] XFS (loop5): Invalid block length (0x1) for buffer [ 779.775958] XFS (loop5): empty log check failed [ 779.780709] XFS (loop5): log mount/recovery failed: error -12 [ 779.788754] XFS (loop5): log mount failed 00:51:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x24001) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000001c0)=0x7, 0x4) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) 00:51:44 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x2}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0xd62, 0x201, 0x4, 0x4, r2}, 0x10) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x5, 0x3ff, 0x20, 0x80, 0x4, 0x8000, 0x4, 0x2, 0x1, 0xaf6e, 0x1, 0x1ff}) 00:51:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:44 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) io_setup(0x7ff, &(0x7f0000000040)=0x0) io_pgetevents(r2, 0x9, 0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={&(0x7f00000001c0)={0x80000001}, 0x8}) 00:51:44 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = accept(r0, &(0x7f0000000040)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f00000000c0)=0x80) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}]}) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 780.051958] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:44 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) epoll_create1(0x80001) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000200)={{0x3, 0x0, 0x1, 0x0, 0x3}, 0x4, 0x734a8a14, 'id0\x00', 'timer1\x00', 0x0, 0x56, 0x0, 0x8, 0x63}) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) fdatasync(r2) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@loopback=0x7f000001, @dev={0xac, 0x14, 0x14, 0x1e}, 0x0, 0x1, [@multicast1=0xe0000001]}, 0x14) [ 780.114840] XFS (loop5): Mounting V4 Filesystem [ 780.123889] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 780.132405] XFS (loop5): Log size out of supported range. [ 780.138041] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 780.221794] XFS (loop5): Invalid block length (0x1) for buffer [ 780.227966] XFS (loop5): empty log check failed [ 780.232693] XFS (loop5): log mount/recovery failed: error -12 [ 780.245586] XFS (loop5): log mount failed [ 780.298055] XFS (loop5): Mounting V4 Filesystem [ 780.303433] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 780.311852] XFS (loop5): Log size out of supported range. [ 780.317472] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 780.329891] XFS (loop5): Invalid block length (0x1) for buffer [ 780.335991] XFS (loop5): empty log check failed [ 780.340737] XFS (loop5): log mount/recovery failed: error -12 [ 780.347493] XFS (loop5): log mount failed 00:51:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:44 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x800000000000000, r0) connect$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x2, @multicast2=0xe0000002}}, 0x1e) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="a79cb351c60aca8b9c39f1cf5f5f0c936454175b0bafc5157542"], @ANYBLOB="fc000000000001000000000000000000"]) 00:51:44 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) accept4$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14, 0x80800) 00:51:44 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x100000000005421, &(0x7f0000000280)=0x4) dup(r0) listen(r0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x8000, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x20000000000, 0x100) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000140)={0x1, r2}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e24, 0x4, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x14}}, 0x6}, {0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x15}, 0x1f}, 0x4, [0x1, 0x300000000000000, 0x4, 0x8, 0x100, 0xbcb8, 0x7fffffff]}, 0x5c) ioctl$FICLONE(r0, 0x40049409, r0) r3 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) fcntl$setflags(r3, 0x2, 0x6174e8d07a7f6a61) 00:51:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:44 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4000, @loopback={0x0, 0x1}}, 0x1c) [ 780.525533] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 780.587142] XFS (loop5): Mounting V4 Filesystem [ 780.596618] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 780.605100] XFS (loop5): Log size out of supported range. [ 780.610761] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 780.628435] XFS (loop5): Invalid block length (0x1) for buffer [ 780.634683] XFS (loop5): empty log check failed [ 780.639423] XFS (loop5): log mount/recovery failed: error -12 [ 780.660638] XFS (loop5): log mount failed [ 780.714747] XFS (loop5): Mounting V4 Filesystem [ 780.721866] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 780.730357] XFS (loop5): Log size out of supported range. [ 780.735956] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 780.761302] XFS (loop5): Invalid block length (0x1) for buffer [ 780.767499] XFS (loop5): empty log check failed [ 780.772254] XFS (loop5): log mount/recovery failed: error -12 [ 780.779973] XFS (loop5): log mount failed 00:51:45 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf261338e1409abda, &(0x7f0000000200)="ebdd013631be5438a2ce6ed5464b2282ad82287919157842eecf2b96b861a5eb9ebda837b109682a65c1ad9fbe16f59f4665fe32a5eb64f889a9c441ee57dfa929080d95fcd7b694391cf94a1558706b7194fcf77061fdcbab1ef6b0502c50c04772969d45f88b467b2ac48011d4e16ce770e501cd5fa043a7faaae5662c0ddc584409626c39f2cba86437b0871cd2ecb8d52adba9ece1d53510e6ce9f6b1d33e94e07406b9e394afe53a9887b4aa406b172150a07d252f3ee20817adba5a65129380d07d68e1ecd70d8646c1d423d1f8f3d82bb12515667703d21d64033beba60ad831813228282ea2cc7721934b7828318031f3de625", 0xf7) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x20, 0x10000) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x80910, r2, 0x0) accept4$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xfffffffffffffffd) 00:51:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:45 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000040)={0x8, 0x1, 'client1\x00', 0x2, "05e2962788c8ee91", "1e185e29e0b23fecf361618c204b4c2490739df2084618a768c587ae92722317", 0x8, 0xc764}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:45 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffe, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x6}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) dup(r0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f00000002c0)) close(r1) r3 = memfd_create(&(0x7f0000000200)='port1\x00', 0x1) r4 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x2000) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) socket$inet6(0xa, 0x80000, 0x200) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x400}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r6, 0xffffffffffffff7f, 0x9}, 0xc) 00:51:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x500, @loopback={0x0, 0x1}}, 0x1c) [ 781.115959] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:45 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f0000000040)=0xfffffffffffffffe, 0x4) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x5, 0x6, 0x9, "6a13a516af14219f754f0f6ed12b62ad526fa1ee120ab0c77e87e9defeab39b437004eb991fe133788651e3de8ebcfa4e9e31b8c98fcc15395943a122668b7", 0x17}, 0x60) 00:51:45 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x501, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$binfmt_aout(r0, &(0x7f0000000200)={{0x108, 0x4, 0xffffffffffff8001, 0x322, 0x1b1, 0x80000001, 0x7c, 0x4}, "a38541c36bfdcb6ad472b7672cb7c611f1ffbc9631f25d6f9f4446c4fd5696d634aa7721cf7ca61a49431195c85bcf19033c4d34faace670f094878be59912100ec46d6e629523d37eccd87c7cc1a12d2e1823f94c6f9a5fb876fc77183702e5ad95cf4cc3916a4155b582404afa49b2ea7ac37494fb384fa88282f9917eb7655b4676947fd070d5b380bbf6963c8ba7ea94d0b300669ce7ef08c09aa8e733906b00899f2574bc85b93bafb37db887ab5a2c23b85d0eb6ab1a801b28a5d8aa261c0cd4094d2c8aa0652b0436d53c9ddb172a4817", [[], [], [], [], [], [], [], [], []]}, 0x9f4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8864], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:45 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="62253370c40038e32ba8fd33566e00026fc778301232698f0f280bf404597a16b33ff27e9e0ad58ba5f468ea16f2021ba5b0470c5c053791144675762ac140f09eaaab1bc072af793bd0"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) listen(r0, 0x2) [ 781.191961] XFS (loop5): Mounting V4 Filesystem [ 781.211854] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 781.220432] XFS (loop5): Log size out of supported range. [ 781.226057] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:45 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'gre0\x00'}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="02000000000000004110dc12b693b3f8080a115354ac832810fc55ec330801df39a88088dbca866be150f66c2dc6be0f4de99e46548b64082c39cedf1c12b102a1f10fd42654f7ea6fb381238a83a0a134890d547e53a2913901e91ed7cf8fd199622b7423007d5c9d946e3ef2db6401a0f289d0648c6b568b710661ab0dbce145cdc4b5bb6d71a48372548817b3a9a9bdd3e23f79a0bcde6214a1f5ab1fcc86c6b45664e6a3376aa2d43a40007bd630305466b13c94d2f29e55d2ab231181261ce366e1be13a5753fa688435320911b2c405971cc33b788b5c633", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000), 0x8) 00:51:45 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x404a02, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x3, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x9}}, 0x9, 0x200}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={r2, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x100, 0x6, 0x5, 0x9, 0x24}, 0x98) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3580], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 781.337486] XFS (loop5): Invalid block length (0x1) for buffer [ 781.343632] XFS (loop5): empty log check failed [ 781.348374] XFS (loop5): log mount/recovery failed: error -12 [ 781.384725] XFS (loop5): log mount failed 00:51:45 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000000c0)="b69820267f26cdffbc642a0969bddb8099c520f4d447f1ba14e7456e928aac897bf942c96b271bfd5de78cf1be435182aa95eca2667b3e58078bd777adaa4c0313fce419dfb14aa0ca5ecc31035d2544a18c286788a79430983b0258c843dd551738b30576ac1915c55656d25cf6b505eb0931b6a9ea46a4ad6a1d373704cac67c981f8b86d93a13") ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000240), 0x10) listen(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x5, &(0x7f0000000180)=[{0x0, 0x2, 0x7, 0xfff}, {0x3, 0x1, 0xfffffffffffff329, 0x7}, {0x20, 0x8001, 0x1, 0xfffffffffffffff9}, {0x7f, 0x7ff, 0x9, 0x8}, {0x6, 0x101, 0x3}]}, 0x10) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:45 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:45 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x80000001, 0x4) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000180)={'veth1_to_bridge\x00', 0x4}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1168dd594d82e85a463cb6d9d8a081f13bbc2ac4f56a5f7a2a751dc74ea44166ceefbea8ce1f87951a019079d5ddb1a67d5b3a84991b0e4d1ec76fb39805b3f1e6f4dbbd5b12d5d91ec07da4adaa43f6243af4a18bc48b1a45ddd42a9820d84178c7228a78e34f4a8f95322ee5bc8ebcdcb125f9222b1a058ad7bc7ab6f3971ea41b50f5015416f0b0d98fe7ff0ff96af22563490b5472482d91892605fd905ef90ec54ad935d64a67fd6dc66c18e2161972991825b7f155b426a1f3f11a276d7018544c8502c20481b35c2755d92b15001aeb4955997e56d6603b3fb679f609b5050d2526616220ad6e2e559c3190ebd0b1961f"}) 00:51:45 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x2}) 00:51:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:45 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0xb, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000100)="637e372ac1cb56ee87e117cf4e8211686408a96d712a8523e7480a047a1073fc51e197f73699ab90", 0x28) listen(r0, 0x0) r2 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @reserved=0x1}, 0x10, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2400, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e22, 0xb7, @mcast2={0xff, 0x2, [], 0x1}, 0x7}}}, &(0x7f00000002c0)=0x84) [ 781.562017] XFS (loop5): Mounting V4 Filesystem [ 781.578670] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 781.587166] XFS (loop5): Log size out of supported range. [ 781.592779] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 781.679143] XFS (loop5): AIL initialisation failed: error -12 [ 781.706669] XFS (loop5): log mount failed 00:51:46 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000180)=""/70, &(0x7f0000000080)=0x46) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:46 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) socket$inet6_sctp(0xa, 0x5, 0x84) 00:51:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe80], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x80fe, @loopback={0x0, 0x1}}, 0x1c) 00:51:46 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:46 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x0, 0x141000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000003c0)=0xf3) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000500)=0x0) ptrace$peekuser(0x3, r3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={r2, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}, 0x4, 0x5871, 0x2, 0x4, 0x40}, &(0x7f00000004c0)=0x98) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000300)={0x6, 0x800}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000200), 0xffffffffffffffd6) socket$bt_hidp(0x1f, 0x3, 0x6) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x1ff, 0x80) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) [ 782.088689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:46 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) setsockopt$llc_int(r1, 0x10c, 0x3, &(0x7f00000000c0)=0x40, 0x4) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:46 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x2}}, [0x1, 0x599, 0x2, 0x8a01, 0x7, 0x6, 0x101, 0x3, 0x10000, 0x3, 0x4, 0x7, 0x9, 0x80000001, 0x1ff]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r2, 0x6, 0x30, 0x1000, 0x40}, &(0x7f00000001c0)=0xf) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 782.166882] XFS (loop5): Mounting V4 Filesystem [ 782.177110] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 782.185700] XFS (loop5): Log size out of supported range. [ 782.191316] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 782.218151] XFS (loop5): Invalid block length (0x1) for buffer [ 782.224332] XFS (loop5): empty log check failed [ 782.229084] XFS (loop5): log mount/recovery failed: error -12 [ 782.252496] XFS (loop5): log mount failed [ 782.364714] XFS (loop5): Mounting V4 Filesystem [ 782.370654] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 782.379102] XFS (loop5): Log size out of supported range. [ 782.384739] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 782.412331] XFS (loop5): Invalid block length (0x1) for buffer [ 782.418600] XFS (loop5): empty log check failed [ 782.423354] XFS (loop5): log mount/recovery failed: error -12 [ 782.429868] XFS (loop5): log mount failed 00:51:46 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:46 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000000), 0x1fe, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$inet(0x2, 0x4, 0x5) 00:51:46 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x2040, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e24}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}], 0x30) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:46 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x8c00) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000080)) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 782.670269] XFS (loop5): Mounting V4 Filesystem [ 782.675775] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 782.684283] XFS (loop5): Log size out of supported range. [ 782.689889] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 782.702765] XFS (loop5): Invalid block length (0x1) for buffer [ 782.709085] XFS (loop5): empty log check failed [ 782.713829] XFS (loop5): log mount/recovery failed: error -12 [ 782.722072] XFS (loop5): log mount failed [ 782.752612] XFS (loop5): Mounting V4 Filesystem [ 782.758309] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 782.766732] XFS (loop5): Log size out of supported range. [ 782.772350] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 782.784495] XFS (loop5): Invalid block length (0x1) for buffer [ 782.790597] XFS (loop5): empty log check failed [ 782.795340] XFS (loop5): log mount/recovery failed: error -12 [ 782.802155] XFS (loop5): log mount failed [ 782.943123] IPVS: length: 70 != 8 00:51:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) timer_create(0x9c63cb05ca2fcf2, &(0x7f00000002c0)={0x0, 0x19, 0x2, @thr={&(0x7f0000000180)="62244660bc0703686e618e249a8183cd85ce086289100c393f2e81c1e1a4298a80a2b440080add903227527f74203c49cff2e61eac13388b787d461502f8edc5a13594984ffa704953efc6216d7a28cd69d09ec0838eb67c2c14d5afac46c750335729c7b007c6fb8f657bb472b88b302044d91c5e85603f84968b2e05f1362e4786d00aa31b9dfd34c612038e2b93ac943fecc563db086b1229b6fc30216458193ef2d3de5a604840d6475be34f1263afaa78c69fce953ae0e7994cad809894cc75e7b41cff06f8392ce01f64dc50c1d58eaad1df52c0836a7d122d107563f5", &(0x7f0000000280)="28184df2de1498bace4be147de01e0a8bc99f4c8d5f21b174b6b"}}, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000380)={{r2, r3+30000000}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000480)={0xf7cb, 0x1, 0x4, 0x704019e1, 0x3, 0x382b}) ioctl(r4, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x80102, 0x0) timer_settime(r1, 0x0, &(0x7f00000003c0)={{0x0, 0x1c9c380}}, &(0x7f0000000400)) 00:51:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1802000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:47 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz1', "7b3e92dbb73826db213026ffe0d2a9a3ebef5e677fe524ad145f0b62470aca3a97e5815422f22d1cd8124b06c3d6609ba205fa7f82429af24f52023a50ab1f440a56d04b2bfb757c65287a33573011218c4e60601deb7d0a829e8b772c582549b951610b0aca2f3be1b124151588a7eef8d6bde6afad19d85890002164563e4f0ddd8ed0abbbf86da39641d3e9cf4438d1f8fa5df56b9cd83ad5714e3209599903be07beafa0809b6a6675e4948bed481dd1c6d46611f171c3bdf995e4a3e7efad9fa4a70743360e05730f126a56804840f2be9c8b94e907865309e198b1d1ccc61d28f47da1caefa97b09c39b199359"}, 0xf4) 00:51:47 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x22) bind$bt_sco(r0, &(0x7f0000000080)={0x1f, {0x8, 0x400, 0x2, 0x1, 0x8, 0x100000000}}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) lseek(r0, 0x0, 0x1) 00:51:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:47 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000e48", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7, 0x3, 0x4e4c}) 00:51:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530f9", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:47 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x8, 0x4, 0xffffffffffff0001, 0x3f, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x8001}, &(0x7f0000000240)=0x8) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5425, &(0x7f0000000100)=0x401) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000200)=r1) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 783.160594] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 783.202148] XFS (loop5): Mounting V4 Filesystem 00:51:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:47 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000040100000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) prctl$setfpexc(0xc, 0x80) [ 783.225582] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 783.234084] XFS (loop5): Log size out of supported range. [ 783.239697] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 783.287153] XFS (loop5): Invalid block length (0x1) for buffer [ 783.293298] XFS (loop5): empty log check failed [ 783.298064] XFS (loop5): log mount/recovery failed: error -12 [ 783.330185] XFS (loop5): log mount failed [ 783.411143] XFS (loop5): Mounting V4 Filesystem 00:51:47 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x5af, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x0, 0xffffffffffffffff, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x800448d3, &(0x7f0000000000)) 00:51:47 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) fstat(r1, &(0x7f00000000c0)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 783.439621] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 783.448080] XFS (loop5): Log size out of supported range. [ 783.453695] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:47 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) r2 = fcntl$dupfd(r1, 0x1000000000406, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) flock(r1, 0x0) 00:51:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 783.526170] XFS (loop5): AIL initialisation failed: error -12 [ 783.533934] XFS (loop5): log mount failed 00:51:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180)={0x7, 0x40, 0x0, 0x1, 0x400}, 0x14) r2 = socket$inet6(0xa, 0x1, 0x0) syslog(0x5, &(0x7f0000000380)=""/109, 0x6d) r3 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xe, 0x80800) ioctl(r3, 0x4000008912, &(0x7f00000001c0)="060000001f16f474edb441e9b380931798b73e3aa998eb0000000000") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/227, 0xe3, 0x1) 00:51:48 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) getrlimit(0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530f9", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:48 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, r0, 0xffffffffffff7fff, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x1}) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0xffffffff, 0x4, 0x3, 0x5, 0x480000}) 00:51:48 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x30], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x200000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:48 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x4, 0x100000001, 0x800}) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1e000, 0x2) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:48 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x40b, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:48 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 784.226454] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:48 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x80800) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast2=0xe0000002}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x8, {0x2, 0x4e24, @rand_addr}, 'yam0\x00'}) [ 784.294602] XFS (loop5): Mounting V4 Filesystem [ 784.308650] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 784.317220] XFS (loop5): Log size out of supported range. [ 784.322816] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 784.338466] XFS (loop5): Invalid block length (0x1) for buffer [ 784.344565] XFS (loop5): empty log check failed [ 784.349304] XFS (loop5): log mount/recovery failed: error -12 [ 784.362927] XFS (loop5): log mount failed 00:51:48 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:48 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) rt_sigreturn() r1 = fcntl$dupfd(r0, 0x100003, r0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x2818c00000000000}) r3 = getpid() setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000000)=0xfb3, 0x4) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0xfff, 0x93, 0x9, 0x9, 0x0, 0x9, 0x14000, 0xfffffffffffffffe, 0x80000001, 0x8f1, 0x2, 0x10000, 0x4, 0x7, 0xd9b, 0xff, 0x9, 0x7fffffff, 0x0, 0x800, 0x77, 0x4, 0x4, 0x0, 0x200, 0x10000004, 0xfff, 0xffffffffffffffc4, 0x100002000, 0x5, 0x8000, 0xfffffffffffffffa, 0x444, 0x802, 0x7f, 0x9, 0x0, 0x80, 0x0, @perf_config_ext={0x4, 0x3}, 0x40, 0x6, 0xffffffffffffff51, 0x7, 0x80000000, 0x9, 0xc475}, r3, 0x6, r2, 0x8) 00:51:48 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x9, 0x10, 0x3, 0x1}, &(0x7f0000000080)=0x18) r2 = memfd_create(&(0x7f00000002c0)='proc:\x00', 0x2) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000300)={0x0, r2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}, [0x6, 0x2, 0x5, 0x3, 0x8, 0x7fffffff, 0x1d27, 0xff, 0x6, 0x8, 0x100, 0x7, 0x3ff, 0x4, 0x1]}, &(0x7f0000000280)=0x100) r3 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x800448d3, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000000000000000000d06309b9023d8ba406f3b8f32670ce39a50f89864238d08c360471a8ecf8584776c685a41b259632756e7a5ca3fb6b9ad5f64d323f793d29cc5936702bfc7b2af789359aa85dfb0e9a568f8d42084bc86396521e4b0da46ca7ac397d811e0cae5d982a23910addcf7a28a77a682de49c"]) 00:51:48 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x3) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:48 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8100], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 784.449632] XFS (loop5): Mounting V4 Filesystem [ 784.457806] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 784.466264] XFS (loop5): Log size out of supported range. [ 784.471885] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:48 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)) [ 784.595259] XFS (loop5): AIL initialisation failed: error -12 [ 784.615213] XFS (loop5): log mount failed 00:51:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r2 = dup(r1) ioctl$sock_bt_hci(r2, 0x40044901, &(0x7f0000000180)="b89372773ff7f771a61936bdceec862f29b0bb663f1dc09785755eadd26d7b1fa1de69f6f12c2d7f8b77a1b68240e60a9be45f3124c0a1f2ddbf91e18faa1a45e4453e7485b05104b4cd4439c8d4159875c8156c3ee73699e5e0") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:49 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r1, 0x8) fallocate(r1, 0x10, 0x1000, 0x7ff) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:49 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) gettid() ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100010000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:49 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="090008000900a2ec3cc39e8fc39e3806000500401e326c0d0200"], &(0x7f00000000c0)=0x18) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x3, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r2, 0x80000001}, 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x100000001, 0x3}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r3, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="acf9663051330e25", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c65308c", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3a6d0f8, @loopback={0x0, 0x1}}, 0x1c) 00:51:49 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="a33d5e91c11264f16b1b237cca43e7051f30a9d89ed7b8d70a71b481b5615a7eac6f22d3aa16f35204614fddc52a00886e8eabb3ffb6765fc7de2bfdc51d6ac4b3"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 785.342748] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:49 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0xfffffffffffffffe) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 785.439703] XFS (loop5): Mounting V4 Filesystem 00:51:49 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:49 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000040)="ffd2388544f272827576dc11fdf93693f7e6181c2d2165f67192612df95d7dcbfdbc65b8b1ee0d64a5b79378531c2c7da491741fc43fe9843d560e4ea4d5cc") ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="000000000000000042450dea630e0749918ca1", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00007918d0c45e3fd431289f9363b900"]) [ 785.459851] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 785.468341] XFS (loop5): Log size out of supported range. [ 785.474592] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:49 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000140)=0x68) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x5, 0x5, 0x7ff, 0x3, 0x9}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000001380)=[@in6={0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, @in6={0xa, 0x4e20, 0x5, @loopback={0x0, 0x1}, 0x7}, @in={0x2, 0x4e22, @rand_addr=0x40}, @in6={0xa, 0x4e20, 0x71, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}], 0x74) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x1008, 0x1, "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"}, &(0x7f0000001200), 0x400) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001240)=ANY=[@ANYBLOB="ed720c8c87af322f2e95c7c476db20c1917333a516878760dbd01472a8fbe98e3395fcc1706583a7d5b2846661690fab4e2f3b28c2421d813c10b9e1d43a3329d5c409a5c85d68072107f1ce1935604bdcc67e01ec19626f9aeceb57ba5e1820f045592dddec67edb8815577e4b0bbade94363b23a6f4f77009f57991d43fdfe5ca695cb6b25045344dd18b24a906d6e57cb64"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:49 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r1 = socket(0xd, 0x4, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3, 0x3, [0x9, 0x1, 0x10001]}, &(0x7f00000000c0)=0xe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x7fff, 0x3}, &(0x7f0000000140)=0x8) [ 785.566179] XFS (loop5): Invalid block length (0x1) for buffer [ 785.572309] XFS (loop5): empty log check failed [ 785.577220] XFS (loop5): log mount/recovery failed: error -12 00:51:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 785.636253] XFS (loop5): log mount failed 00:51:50 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) shmget$private(0x0, 0x2000, 0x4c, &(0x7f0000ffc000/0x2000)=nil) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80, 0x0) [ 785.754011] XFS (loop5): Mounting V4 Filesystem [ 785.778458] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 785.786999] XFS (loop5): Log size out of supported range. [ 785.792644] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 785.816476] XFS (loop5): AIL initialisation failed: error -12 [ 785.830654] XFS (loop5): log mount failed 00:51:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time, 0x16, {}, 0x0, 0x0, 0x88}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000180)={"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"}) 00:51:50 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x8, 0x2, 0x1000, 0x800, 0x0, 0xfee1}) finit_module(r0, &(0x7f0000000040)="2d7f212a00", 0x3) 00:51:50 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x3, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000140)) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000200)) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) r5 = fcntl$getown(r3, 0x9) setpgid(r4, r5) connect$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 00:51:50 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x400}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000040)={0x800, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1, 0xa, [{{0x2, 0x4e21, @multicast2=0xe0000002}}, {{0x2, 0x4e22, @rand_addr=0x4}}, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e24, @loopback=0x7f000001}}, {{0x2, 0x4e22, @loopback=0x7f000001}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}}, {{0x2, 0x4e20, @rand_addr=0xdb4}}, {{0x2, 0x4e21, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @multicast1=0xe0000001}}, {{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}]}, 0x590) 00:51:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\t', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x10, @loopback={0x0, 0x1}}, 0x1c) [ 786.390086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:50 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) socket$inet6(0xa, 0x6, 0x7) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:50 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x1, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x22, 0x8, 0x3ff, 0x0, 0xffffffffffffffff, 0x0, [0x3]}, 0x2c) r2 = fcntl$dupfd(r0, 0x0, r0) prctl$getreaper(0x13, &(0x7f00000001c0)) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x80, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)="42d1ca37f92dc552fbc57e27f6a593b7f2c4e472054f5f706d", 0x19}], 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r2, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRES32=r0]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="aa96da0000763b9f738daf79f6f64e0882bb6a1aa32f19a9cdd82b6da2ccc67632fd67bd0006000000000000000600dc4feccd95636dce9fa7d1e2bda3517de33c6a0e8bd38434cd10e5e65eea01000000618258ed2af2ec3351a279578000affc5512"], @ANYRES32=r2]) 00:51:50 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:50 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) [ 786.490675] XFS (loop5): Mounting V4 Filesystem [ 786.503893] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 786.512387] XFS (loop5): Log size out of supported range. [ 786.518076] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:51 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0x4, 0x8) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:51 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) socket$inet6(0xa, 0x800, 0x1) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x3, 0x9}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 786.642587] XFS (loop5): Invalid block length (0x1) for buffer [ 786.648743] XFS (loop5): empty log check failed [ 786.653479] XFS (loop5): log mount/recovery failed: error -12 00:51:51 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="000000000000000000000000000000004ebe394006343b1120c04bb3de885ff59aa48ae6127b948bd4a26ad4417c37b201cd7d1609a80ac31b699b535ef7b081e41b79ef7ac2844675880d47103ca02145e6fda0cec2314c8e0762687e0428640e99c0a265966212db8a49d4a8aeacda1d97971098ab1bdaade963672e07cda20ef8c8ba41d68bf0ffc37f523480599d19d1ab9e258908da2fc20a8f985dd392c9e1d29472dd63edd5d9a670a1d570310e852781b07f95634feedb27341ad7e0"]) getsockopt$inet6_dccp_int(r1, 0x21, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 786.698623] XFS (loop5): log mount failed [ 786.807174] XFS (loop5): Mounting V4 Filesystem [ 786.817084] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 786.825640] XFS (loop5): Log size out of supported range. [ 786.831289] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 786.897125] XFS (loop5): AIL initialisation failed: error -12 [ 786.909642] XFS (loop5): log mount failed 00:51:51 executing program 2: keyctl$session_to_parent(0x12) r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x1) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000180)) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="39d5cbed93cc506fff9fc9af1b7c9967ff0794bedc8e1262743837fa020000000058f9db007f553b4a8da0feebdaf767c8ea4d01fb490f2fbddbb629765cb4e50e3f2ed0a7273b34236bc3c99d56861a40586fa391b605a44f9c826df0ba8deee6920df82141ace5c6efa5faabd2b33d8d9877e741c32eb27cdd4e20e9781f129356feb99f86903861e0f93be20f2041adfa00d20da4b95b"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000280)=""/219, &(0x7f0000000040)=0xdb) 00:51:51 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) 00:51:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:51 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) write$tun(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00009bf70280020003000000fff6ffff006c800400000000000000000000cabb0000000022755771982a00044e8017e3221ace6c5778550e448ae396081405dc96953021a52a242b2658b061d18c15b15817935f74c49bf187038b2503688b96b8b3fd85481d7a935879ac93f71353164c8070de29d50b99fd23b0b28fe6d78208a6de3686efba2f08d9e1a9185efd6e6413a2e44ecf6368bc683acdf9d8df491d85f3ef435968ebcb51c303f197c072d407c51d82feb84287c35b1f7aa6ae61ad01361f83ce5053cbf619dbe8fa74f4"], 0x7a) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time, 0x8, {0x8, 0x2}}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2, &(0x7f0000000240)=[{&(0x7f00000001c0), 0x0, 0x5}, {&(0x7f0000000200)="3e869aa1df03a240b95fdea7d3276c71ff67eec0bf9ffc6bd98ffc45be3a", 0x1e, 0x9}], 0x40000, &(0x7f0000000280)={[{@noauto_da_alloc='noauto_da_alloc', 0x2c}, {@grpid='grpid', 0x2c}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xca, @loopback={0x0, 0x1}}, 0x1c) [ 787.455945] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:51 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) getpeername(r0, &(0x7f00000000c0)=@in6={0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x80) 00:51:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:51 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:51 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="fc356a74c7c7dcaa7a5a4159d8e6feb962a58b80fec1ae6b0b002584b16a38da6c689b5d819a9d8b808a70cdec32ca42cec8851ea52fc0424a159a6439385e540f4366fcf18faa8f97df1176d63f8904087b8eb66b75917462d8f873ae2e6966b6f1fa8c167f66b6a2a7c5375960385cc1d6349de5478df4b842db83f3337ee0e428b9cb81998c6dbff8708c20a9f5aeea3bf9770fb2ee77344b7a0b8b4bdd154a58a858782410694ed22a3c534cff69", 0xb0, 0xfffffffffffffffb) r3 = add_key(&(0x7f0000001680)='dns_resolver\x00', &(0x7f00000016c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000001700)="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", 0x1000, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r2, &(0x7f00000015c0)=[{&(0x7f0000000180)="6e320ae5011bdc1f29a204743d80d9aa", 0x10}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="7d43e6e6126c7d4fc642503de817b0884fc83222a99c81373c6c95aff830b183b1decefc923ef0271c32c1ee5606e9", 0x2f}, {&(0x7f0000001200)="dbe9b94c6089d2e902c9aa3ac285bb71e164868dc0045f2b", 0x18}, {&(0x7f0000001240)="d29ca6bfe352aa5e97f4a335966d41339e9f1259c3f6c3c9a9e8d84716ca6560fd1cbc7c77f2395e0d582a0ce2d233526bab4ffd27f2996002d98c5fa7ceeb594f996ff8b80ec0bea76bc2316bc4f8a7d24e77b7940e310c5577d26989bbd8a1ac1aada2f723e6294a2b5f557105df952c8183ef9ec96306632888a2714e58553bfe796f82c06a8f5d3641db0a03b9bb52e6bcc9046ab61e984315293e2cb9c25c3931edf529aba504e400d411", 0xad}, {&(0x7f0000001300)="4c4d791b43b64ac8aca50baee4e4e87555fe12edc52e31f0e8d13cbe759e6c76c2670e1911fa24a11ddc44143952fce4c1bb5ae2493d840a448d0e7dd759db8a71b6b897b434e24e73795c24273401f35e06ca20eb4f535d26ad420c17de5c8e7cf8353ab52bcf7dda05f6f88ff4c9c161d52ef021444993a449b83523a32191c5503989dd992ed5a8d4fa46cfe849909e414d7d7779c3aa073a981d6efefa", 0x9f}, {&(0x7f00000013c0)="3d50909eda220505b6566cdc868ed030e9b980dbc076a41a7d632976e11eece8bbf23e56ecc6569836602fcaadf097875631aac626e4bdda4da14891fb6b5456b8b4b3de6c724dc2fcc443f7c720e5c14c7aff67144afbf1a75fd6ed768fe90ca3273b4be11cecd96f31c284e3cc56999c525cd940c4c94fcb2a", 0x7a}, {&(0x7f0000001440)="d771ab4ee39bf862d35cc50f6f55b9ce0c286be428045c8cb0a077a7a21a47513fe6d8942c922c1ee0f7a00400454504d2043afa549d6e31bd6a14b34788f1e966f58ecaf4251c4f69933a43381ac05cdd20adcc6510e5c304f3029f84a1772fcc615e705a06df73d222178f3787a85d40", 0x71}, {&(0x7f00000014c0)="7f1b5722b1f575188ff4358418b9eb133bd904d338e95b273095fa9c7d9adaa75c17e40f73f084819df9598b024ac7c16fd0fb1244d283404d0355ab3f40467fea05786eb648252463f0616d129de1430332a62ed2b8bf44c0b4d901f05fe7c5a3f028ad6bed2d31f52dbff5aebcc0c8b810c4329375465750697ac95fa94f30962650ca336fc8453704cf863389c262831b2042faa3a3ca2c7853cc0fbf30c7e74c5d0a7b233dec2346b131c4d1c6e3becbe4cd60f667be10eab844857df9a835ce5d7f22488b9ca5e9011956227251877370e1247c8617babff66cd5d1dc4a8ddce1", 0xe3}], 0x9, r3) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="c33b80d34d7862f7", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) fcntl$setstatus(r1, 0x4, 0x2000) [ 787.507982] XFS (loop5): Mounting V4 Filesystem [ 787.517575] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 787.526102] XFS (loop5): Log size out of supported range. [ 787.531722] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:51 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x401, 0x20, 0x2, 0x2}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x40, 0x10}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r3, 0x6, 0x0, 0x0, 0x0, @ib={0x1b, 0xfff, 0x7, {"21ac221cd25262afb993c276071f7cdb"}, 0xb8ec, 0x8, 0x5}, @in6={0xa, 0x4e22, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x7}}}, 0x118) fcntl$getflags(r0, 0xb) getsockopt$nfc_llcp(r1, 0x118, 0x2, &(0x7f0000000400)=""/4096, 0x1000) r4 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x800448d3, &(0x7f0000000000)) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000003c0)={0x6, 0x4, 0x1, 0x3}) 00:51:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 787.617170] XFS (loop5): Invalid block length (0x1) for buffer [ 787.623323] XFS (loop5): empty log check failed [ 787.628103] XFS (loop5): log mount/recovery failed: error -12 00:51:52 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/14) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) sendmsg$unix(r1, &(0x7f0000000180)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000000c0)="d7ea8dc78065dfbc1c7b3e1c51eb2d73b7", 0x11}], 0x1, &(0x7f0000000140)}, 0x4014) 00:51:52 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x6) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 787.667729] XFS (loop5): log mount failed 00:51:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:52 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r1, r2) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x3a, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) 00:51:52 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x204001, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000080)={0x2, 0x1, {0x2, 0x2, 0xfffffffffffffffc, 0x6, 0x9}}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 787.820012] XFS (loop5): Mounting V4 Filesystem [ 787.825633] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 787.834127] XFS (loop5): Log size out of supported range. [ 787.839747] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 787.926339] XFS (loop5): AIL initialisation failed: error -12 [ 787.963262] XFS (loop5): log mount failed 00:51:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:52 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 788.144638] XFS (loop5): Mounting V4 Filesystem [ 788.150187] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 788.158641] XFS (loop5): Log size out of supported range. [ 788.164242] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 788.176517] XFS (loop5): Invalid block length (0x1) for buffer [ 788.182623] XFS (loop5): empty log check failed [ 788.187335] XFS (loop5): log mount/recovery failed: error -12 [ 788.193659] XFS (loop5): log mount failed [ 788.219357] XFS (loop5): Mounting V4 Filesystem [ 788.226438] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 788.234872] XFS (loop5): Log size out of supported range. [ 788.240460] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 788.252832] XFS (loop5): Invalid block length (0x1) for buffer [ 788.258853] XFS (loop5): empty log check failed [ 788.263589] XFS (loop5): log mount/recovery failed: error -12 [ 788.269985] XFS (loop5): log mount failed 00:51:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4042, 0x0) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:52 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:52 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000008916, &(0x7f0000000480)="2940e1311ffb1609786710641a357ae48f8a19530e6126325b3b381a0dfd15cb0a5893a09a806d41c5f65f1f1d1b30d4f55feb321a26f24b39bb5f41838bf9f7ca81924381376260b1e43b9dfa1edc2a772de1e5046ad95c165d876c95c84369108dfad14b9e7f129050afa8986be80321213c903e454602ef0a168f5e89b0b5851e3b601d37c7b8b4593af2c71a4bc618cfba2d") r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) keyctl$get_persistent(0x4, r4, r3) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="13cd0b444d10e981bf2d685085f147ecc31fa5b9edffa9815e41070000005af2e0f9c5"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xf8d0a603, @loopback={0x0, 0x1}}, 0x1c) 00:51:52 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$getown(r0, 0x9) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f0000000040), 0x9) r3 = fcntl$dupfd(r0, 0x40a, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)) 00:51:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:52 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40000, 0x0) getsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000000c0)=""/90, &(0x7f0000000140)=0x5a) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r2 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000240)={0x13, 0x27, &(0x7f0000000180)="4534a92986cdada32e3ccae53fe565c78cff883a6399c9470033b9f0e17e9f243709a9f18604af"}) ftruncate(r2, 0x1e) 00:51:52 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:52 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x2000000000000000, @any=0xffffffff}, 0x10, 0x0) [ 788.577960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:53 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x541f, &(0x7f00000000c0)=0x3) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xdc05000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 788.676624] XFS (loop5): Mounting V4 Filesystem [ 788.691633] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 788.700118] XFS (loop5): Log size out of supported range. [ 788.705747] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:53 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:51:53 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400040, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000280)={0x8, 0x0, [{0x6, 0x1, 0x0, 0x0, @msi={0x401, 0x2, 0x100}}, {0x40, 0x4, 0x0, 0x0, @irqchip={0xfffffffffffff118, 0x93}}, {0xf2c3, 0x1, 0x0, 0x0, @msi={0x6, 0x1, 0x5}}, {0x10001, 0x2, 0x0, 0x0, @msi={0x7, 0x2, 0x400}}, {0x9, 0x3, 0x0, 0x0, @sint={0x6, 0x80}}, {0x3, 0x1, 0x0, 0x0, @msi={0x9, 0x5, 0x3de13555}}, {0x1, 0x0, 0x0, 0x0, @msi={0x2, 0x8, 0x3}}, {0x9, 0x6, 0x0, 0x0, @irqchip={0x1, 0x8}}]}) r2 = fcntl$dupfd(r0, 0x2, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00fa748000000000000000d7"]) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000100)) getdents64(r2, &(0x7f0000000040)=""/110, 0x6e) [ 788.728622] XFS (loop5): Invalid block length (0x1) for buffer [ 788.734795] XFS (loop5): empty log check failed [ 788.739550] XFS (loop5): log mount/recovery failed: error -12 [ 788.747359] XFS (loop5): log mount failed 00:51:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 788.851365] XFS (loop5): Mounting V4 Filesystem [ 788.857971] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 788.866469] XFS (loop5): Log size out of supported range. [ 788.872113] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 788.942661] XFS (loop5): AIL initialisation failed: error -12 [ 788.958636] XFS (loop5): log mount failed 00:51:53 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="77761213a19077b485ceb030dde58d81f1f441e9ab"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:51:53 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:51:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x4, 0x20200) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r2, 0xffefffffffffff7f) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f00000001c0)={0x6, 0x6}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r5 = socket$inet6(0xa, 0x1, 0x0) write$binfmt_elf32(r4, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) ioctl(r5, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x0, 0x30}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) write$binfmt_aout(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="da"], 0x1) write$binfmt_misc(r4, &(0x7f0000000240)={'syz1'}, 0x34000) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4, @loopback={0x0, 0x1}}, 0x1c) 00:51:53 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) [ 789.450205] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4305], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 789.506503] XFS (loop5): Mounting V4 Filesystem [ 789.521834] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 789.530349] XFS (loop5): Log size out of supported range. [ 789.535982] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:54 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x305000, 0x110) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x8d06, 0x1, 0xfffffffffffffffd, 0x6, 0x100000000, 0x4}) 00:51:54 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)) 00:51:54 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 789.616218] XFS (loop5): Invalid block length (0x1) for buffer [ 789.622414] XFS (loop5): empty log check failed [ 789.627163] XFS (loop5): log mount/recovery failed: error -12 00:51:54 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 789.656502] XFS (loop5): log mount failed [ 789.723078] XFS (loop5): Mounting V4 Filesystem [ 789.735849] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 789.744323] XFS (loop5): Log size out of supported range. [ 789.750042] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:54 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x800448d2, &(0x7f0000000000)) 00:51:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 789.834896] XFS (loop5): AIL initialisation failed: error -12 [ 789.850697] XFS (loop5): log mount failed 00:51:54 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r2 = memfd_create(&(0x7f0000000040)='ppp0self}', 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000100)={0x1d, r3}, 0x10) 00:51:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:54 executing program 2: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)="33d07fcc76aa31026d2746e5d5db6b86597a4c98e2d7625142c2c6ffd410f21f4a998b4b253041ec4fa34df51cfecc14c10c2bc1df15a8", 0x37}], 0x1, 0x4) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000000c0)=r4) fremovexattr(r3, &(0x7f0000000040)=@random={'osx.', '{\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e22, 0xde9, @empty, 0x40}, {0xa, 0x4e20, 0x1, @loopback={0x0, 0x1}}, 0x5, [0x3, 0xae, 0x85, 0x9, 0x5, 0x9, 0x40, 0x1]}, 0x5c) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d3, &(0x7f0000000000)) 00:51:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:54 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) [ 790.077799] XFS (loop5): Mounting V4 Filesystem [ 790.085380] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 790.090366] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 790.104265] XFS (loop5): Log size out of supported range. [ 790.109870] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 790.142680] XFS (loop5): Invalid block length (0x1) for buffer [ 790.148849] XFS (loop5): empty log check failed [ 790.153707] XFS (loop5): log mount/recovery failed: error -12 [ 790.187204] XFS (loop5): log mount failed [ 790.262368] XFS (loop5): Mounting V4 Filesystem [ 790.274923] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 790.283909] XFS (loop5): Log size out of supported range. [ 790.289527] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 790.302599] XFS (loop5): Invalid block length (0x1) for buffer 00:51:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0xfffffffffffffd12) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x106, 0x40) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000180)) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0xfffffffffffffffd, 0x0, 'queue0\x00'}) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 790.308696] XFS (loop5): empty log check failed [ 790.313441] XFS (loop5): log mount/recovery failed: error -12 [ 790.320925] XFS (loop5): log mount failed 00:51:54 executing program 6: syz_mount_image$nfs(&(0x7f0000000280)='nfs\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000340)=[{&(0x7f0000000300)="6f516ee643ccd80ee608cd2e0da3f7d40bc1024a4aad2083c703467369c795c13052", 0x22, 0x101}], 0x21, &(0x7f0000000380)='vboxnet0\x00') r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0xfffffffffffffffe, @any=0xffffffff}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x10800, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x101000, 0x0) listen(r3, 0x80) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000240)=@int=0x2, 0x4) r4 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0x505081) ioctl$KVM_SET_TSC_KHZ(r4, 0xaea2, 0x4000002) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020f09050f00000026bd7000ffdbdf2501001400ff000000050006006c2004000a004e230500000000000000000000000000000000000000f7ffffff00000000010017004e24000d02001000000004d6000004d40000000002000b0002000000010100000000000002001000000004d2000004d300000000"], 0x78}, 0x1}, 0x44) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:54 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000340)='yam0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xffff, 0x2, 0x5, 0xfffffffffffffffe, 0x0, 0x0, 0x4408, 0x0, 0x3, 0x5, 0x8, 0x3f, 0x4, 0x3, 0x1, 0x5e, 0x4, 0x7fffffff, 0xfffffffffffffe01, 0xb4, 0x7, 0xffffffffffffffa5, 0x1, 0x2, 0x3, 0x7ff, 0x8, 0x4, 0x401, 0x8, 0x20, 0x2600000000000000, 0x800, 0x800, 0x6, 0x37bd, 0x0, 0x64205c02, 0x4, @perf_config_ext={0x8, 0x745}, 0x80, 0xd08, 0x9, 0x7, 0x618b, 0x2, 0x20}, r1, 0xe, 0xffffffffffffff9c, 0x8) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x2, 0x0) openat$cgroup_type(r2, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) r3 = fcntl$dupfd(r0, 0xfffffffffffffffc, r0) syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x81, 0x1) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x800}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000440)={r5, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0xc9a, 0x4, 0xe8, 0xffff}, &(0x7f0000000500)=0x98) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d3, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000100)={0x1f}, 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xbe56}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000000c0)={r6, 0x40, 0x3}, 0x8) 00:51:54 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:51:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 790.642592] XFS (loop5): Mounting V4 Filesystem [ 790.653638] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 790.662110] XFS (loop5): Log size out of supported range. [ 790.667745] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 790.744162] XFS (loop5): Invalid block length (0x1) for buffer [ 790.750287] XFS (loop5): empty log check failed [ 790.755129] XFS (loop5): log mount/recovery failed: error -12 00:51:55 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:55 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)) [ 790.791528] XFS (loop5): log mount failed 00:51:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000180)=0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3f, 0x400) accept$alg(r2, 0x0, 0x0) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:55 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xb000000, @loopback={0x0, 0x1}}, 0x1c) 00:51:55 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:55 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x4) listen(r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000)=0x8000, &(0x7f00000000c0)=0x2) r2 = open(&(0x7f0000000100)='./file0\x00', 0x208000, 0xbbd3d50289facdf4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x40}, 0x1c) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 790.888626] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:55 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) [ 790.938686] XFS (loop5): Mounting V4 Filesystem 00:51:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:55 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000100)=0x8) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 790.962770] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 790.971254] XFS (loop5): Log size out of supported range. [ 790.976884] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:55 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:51:55 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="0db121fb9f1d9162dc573b406247a88df1ebbd345ac3b8ea2d108b786cee762506e714b9da93a193f4bf533cdbf3bb58d569cdb9b58cd13f44"], @ANYBLOB="00000000000000000000000000e6a23d"]) 00:51:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 791.123300] XFS (loop5): AIL initialisation failed: error -12 [ 791.155498] XFS (loop5): log mount failed 00:51:55 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000180)=0x80000001, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x3ff, 0x10000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x7, 0x8203, 0x3, 0x6, r2}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) 00:51:55 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8903, &(0x7f0000000000)) 00:51:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file02', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 791.450690] XFS (loop5): Mounting V4 Filesystem [ 791.468639] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 791.477183] XFS (loop5): Log size out of supported range. [ 791.482819] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 791.529948] XFS (loop5): Invalid block length (0x1) for buffer [ 791.536164] XFS (loop5): empty log check failed [ 791.540919] XFS (loop5): log mount/recovery failed: error -12 [ 791.547972] XFS (loop5): log mount failed [ 791.631404] XFS (loop5): Mounting V4 Filesystem [ 791.638346] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 791.646833] XFS (loop5): Log size out of supported range. [ 791.652532] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 791.664697] XFS (loop5): Invalid block length (0x1) for buffer [ 791.670865] XFS (loop5): empty log check failed [ 791.675731] XFS (loop5): log mount/recovery failed: error -12 [ 791.682670] XFS (loop5): log mount failed 00:51:56 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:56 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000009, 0x2010, r0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) fallocate(r0, 0x21, 0x7, 0x10001) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2, @any=0xffffffff}, 0xffffffffffffff99, 0x0) 00:51:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) socketpair(0xa, 0xf, 0x769, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x2000000005, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x1b2a067ed9e38c51}, &(0x7f0000000180)=0x18) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x3, &(0x7f00000001c0)=[{0x80000001, 0x9, 0x7, 0x1}, {0x3, 0x3, 0xfff, 0xaa8}, {0x8, 0x0, 0x5, 0x7}]}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffff}}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r3, r4}}, 0x18) r5 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x800448d3, &(0x7f0000000000)) 00:51:56 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0045878, &(0x7f0000000000)) 00:51:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5400, @loopback={0x0, 0x1}}, 0x1c) 00:51:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c653003", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:56 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0189436, &(0x7f0000000000)) [ 791.919383] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:56 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getpeername(r0, &(0x7f00000000c0)=@in={0x0, 0x0, @multicast2}, &(0x7f0000000040)=0x80) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r2 = geteuid() getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) fchownat(r1, &(0x7f0000000180)='./file0\x00', r2, r3, 0x1800) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000480)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000006700)={'teql0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006740)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000006840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000006880)={'team0\x00', 0x0}) accept4$packet(r1, &(0x7f0000007c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000007cc0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000007e80)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000007f80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000007fc0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000083c0)={'bridge_slave_0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000008780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000008740)={&(0x7f0000008400)={0x304, r2, 0x0, 0x70bd29, 0x25dfdbfb, {0x3}, [{{0x8, 0x1, r3}, {0x16c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x3}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1000}}}]}}, {{0x8, 0x1, r7}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8000}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x100000001}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xe8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1fb6400000000}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x44, 0x4, [{0x4, 0x10001, 0x8, 0xe60a}, {0x8, 0x58, 0x1f, 0x6b}, {0x7, 0x47ea2223, 0x4, 0x2}, {0x4, 0x200, 0x0, 0xffffffff}, {0x7, 0x4, 0x0, 0x2}, {0xa1c1, 0x7, 0x9, 0xffffffffffffffe0}, {0x4, 0x80000000, 0x0, 0x6}, {0x1, 0x8, 0x176c, 0x1}]}}}]}}]}, 0x304}, 0x1}, 0x10) 00:51:56 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5452, &(0x7f0000000000)) [ 792.051149] XFS (loop5): Mounting V4 Filesystem [ 792.058180] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 792.066672] XFS (loop5): Log size out of supported range. [ 792.072285] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:56 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x2, 0x2, 0x1f, 0x1f, 0x80000001}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={r2, 0x4}, &(0x7f0000000280)=0x8) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 792.154532] XFS (loop5): Invalid block length (0x1) for buffer [ 792.160717] XFS (loop5): empty log check failed [ 792.165491] XFS (loop5): log mount/recovery failed: error -12 [ 792.229514] XFS (loop5): log mount failed 00:51:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00@', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0000000000000000000000000000000065182a22a6a039e2df86749f70278d8f2144adb4a1a8b3c71e137cb8dae57239f4be621c6a19b5d77352932e605d34b6c547cea5b65654269afa12708d4b5881670d1d7958012ed7f5feed4a6db8f766d4593329a2d66ef7fd8ffa1b6fa6ec06d589d3ee5441e5dee4b6defae4a77c69f834d7076dbdb80f3edbbcd047a50bed8f9516e327f3"]) [ 792.307157] XFS (loop5): Mounting V4 Filesystem [ 792.352625] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 792.361183] XFS (loop5): Log size out of supported range. [ 792.366799] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 792.411249] XFS (loop5): AIL initialisation failed: error -12 [ 792.418071] XFS (loop5): log mount failed 00:51:57 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:57 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x185080, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @remote}, &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000140)={@loopback=0x7f000001, @multicast1=0xe0000001, r2}, 0xc) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0xfe) listen(r0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180), 0x2) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x2ab, 0x3e6, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000000000000000000b3c1beafc2ba736433946001066c0e9daf6dfb6855c87792a4dd439583d30ea818cfa4faac6a6b30473536b6058779dd627d00e10dcd1f5df9ea44d42d7cf8a99877afd6310c1361d742f116fe52a4ebdb0b00dbfb8a17d88aeb"]) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) mq_timedreceive(r1, &(0x7f0000000080)=""/71, 0x47, 0xb2f8, &(0x7f0000000100)={0x77359400}) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000000)={0x6, 0x1000}) 00:51:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8902, &(0x7f0000000000)) 00:51:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa00, @loopback={0x0, 0x1}}, 0x1c) 00:51:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c653003", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x8000a, 0x3) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400400, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0xb5) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x1000, 0x96, &(0x7f0000000800)="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", &(0x7f0000000180)=""/150, 0x5}, 0x28) [ 792.987628] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:57 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x101000, 0x12) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='\x00'], &(0x7f0000000200)=[&(0x7f0000000180)='#system\x00'], 0x800) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x3) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x0) 00:51:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8980, &(0x7f0000000000)) 00:51:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 793.083430] XFS (loop5): Mounting V4 Filesystem 00:51:57 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x4000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x200a}) listen(r0, 0x0) r2 = dup2(r0, r0) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, {0x42d, 0x8, 0xa58, 0x1f, 0x2, 0x80000000}, 0x4, 0x5}, 0xe) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 793.110914] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 793.119447] XFS (loop5): Log size out of supported range. [ 793.125089] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c9, &(0x7f0000000000)) 00:51:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="ff88fde820a181199b6f77f2ccbfedc07fabfb4c76e5e31e30ec3494f86b79d8e43d71627e0de93fe47d6c57b12f45e9"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x84, &(0x7f0000000280)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0x6, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1}, @in6={0xa, 0x4e20, 0x8000, @loopback={0x0, 0x1}, 0x9}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in6={0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x3}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={r2}, 0x8) [ 793.183684] XFS (loop5): Invalid block length (0x1) for buffer [ 793.189868] XFS (loop5): empty log check failed [ 793.194632] XFS (loop5): log mount/recovery failed: error -12 [ 793.220273] XFS (loop5): log mount failed 00:51:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8904, &(0x7f0000000000)) [ 793.332370] XFS (loop5): Mounting V4 Filesystem [ 793.374365] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 793.382890] XFS (loop5): Log size out of supported range. [ 793.388559] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 793.430641] XFS (loop5): AIL initialisation failed: error -12 [ 793.438749] XFS (loop5): log mount failed 00:51:58 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:58 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:58 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8983, &(0x7f0000000000)) 00:51:58 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:51:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:58 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xcf, @loopback={0x0, 0x1}}, 0x1c) 00:51:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl(r1, 0x4000008912, &(0x7f0000000180)="060000000000000098811e76df69ed2966e1f70f00000000000000c8c7ec089be5244f052f0cd84ace1fbfda7478ada8d92e9b2af73c2bd98deba2e6e610a412395572b191405e621676b056543f60eaceb5cea6518d3e7a11dbee94f30700b2d8222f50d1ca0e3b3e3daf1e2695d78ab816ba61a075fb445a7d9529edc8c666446d1cb0862cea45d3a5e8e7") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 794.047456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:51:58 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5450, &(0x7f0000000000)) 00:51:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:58 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:58 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0xf9, 0x0, [0x80, 0x80000001, 0xf3]}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="000000000000000011667608613fd1fe940e51eb129fc8988b0e9c53648c94cbf7945fd9fbd47ee8279f1757cfe59d4b7b1d54c06be95d1264a0270bc642bbfb7af5ec", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x2c, @rand_addr=0x6ea, 0x4e21, 0x2, 'wrr\x00', 0x5, 0x200, 0x27}, 0x2c) [ 794.139944] XFS (loop5): Mounting V4 Filesystem [ 794.155367] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 794.163931] XFS (loop5): Log size out of supported range. [ 794.169574] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:51:58 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x4020940d, &(0x7f0000000000)) 00:51:58 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8002, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x2, 0x9}) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000000100)={@ipv4={[], [], @dev}}, &(0x7f0000000140)=0x14) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8, 0xda3, 0x5c, 0x6, 0xa2}, &(0x7f0000000180)=0x98) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000380)={r1}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e24, 0x100, @remote={0xfe, 0x80, [], 0xbb}, 0xc85}}}, 0x84) [ 794.240744] XFS (loop5): Invalid block length (0x1) for buffer [ 794.246843] XFS (loop5): empty log check failed [ 794.251584] XFS (loop5): log mount/recovery failed: error -12 [ 794.277686] XFS (loop5): log mount failed 00:51:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:58 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x894c, &(0x7f0000000000)) [ 794.425213] XFS (loop5): Mounting V4 Filesystem [ 794.435577] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 794.444108] XFS (loop5): Log size out of supported range. [ 794.449723] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 794.478963] XFS (loop5): AIL initialisation failed: error -12 [ 794.486589] XFS (loop5): log mount failed 00:51:59 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="e3eb23ec44ffddda", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0000000000000000000000ddffffff001bfb4918abf4fa6d52636c0ce3fcf2e4d2228d935094589986de3de0b7115381cb76220cd034bbf8c77147e87ca7238dba8ea7488b6019d848cf86a8a0332759819c74bd5ad827c46315578bb80173"]) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 00:51:59 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:51:59 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5451, &(0x7f0000000000)) 00:51:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5, @loopback={0x0, 0x1}}, 0x1c) 00:51:59 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xb4, r1, 0x100, 0x70bd2c, 0x25dfdbfe, {0x3}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa0}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0xb4}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r2 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:51:59 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x28000) r2 = eventfd(0x7) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000140)=r2) ioctl$int_in(r0, 0x5421, &(0x7f0000000180)=0x200000000000) fcntl$setflags(r0, 0x2, 0x1) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000400)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x28) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000480)={r4, 0x7}, 0x8) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f00000000c0)=0x5cad, 0x1) listen(r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x80000000, @dev={0xfe, 0x80, [], 0x18}, 0x3}}, 0x6c4, 0x1, 0x0, 0x3, 0x3}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={r5, @in6={{0xa, 0x4e22, 0x2, @empty, 0xffffffffffffe398}}, 0x3, 0x6}, &(0x7f00000003c0)=0x90) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101001, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:51:59 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000000)) 00:51:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 795.128542] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.189609] XFS (loop5): Mounting V4 Filesystem [ 795.237257] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 795.245850] XFS (loop5): Log size out of supported range. [ 795.251475] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 795.277494] XFS (loop5): Invalid block length (0x1) for buffer 00:51:59 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5460, &(0x7f0000000000)) 00:51:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x5}, &(0x7f0000000100)=0x8) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) [ 795.283680] XFS (loop5): empty log check failed [ 795.288445] XFS (loop5): log mount/recovery failed: error -12 [ 795.320922] XFS (loop5): log mount failed 00:51:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:51:59 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8901, &(0x7f0000000000)) [ 795.464437] XFS (loop5): Mounting V4 Filesystem 00:51:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7f, 0x0, 0x4}) [ 795.486385] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 795.494848] XFS (loop5): Log size out of supported range. [ 795.500452] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 795.532173] XFS (loop5): AIL initialisation failed: error -12 [ 795.541479] XFS (loop5): log mount failed 00:52:00 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:00 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8941, &(0x7f0000000000)) 00:52:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x500000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x40000210000) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x7c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:00 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000001c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x60203, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000080)={@loopback, @loopback}, &(0x7f00000000c0)=0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r3 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000140)={'nat\x00', 0x0, 0x0, 0x1fc, [], 0x10000288, &(0x7f0000000040), &(0x7f00000022c0)=""/4096}, &(0x7f0000000000)=0x108) 00:52:00 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) getsockopt(r0, 0xc30, 0x7ff, &(0x7f00000003c0)=""/40, &(0x7f0000000400)=0x28) set_robust_list(&(0x7f0000000380)={&(0x7f00000002c0)={&(0x7f0000000180)}, 0x7fff, &(0x7f0000000340)={&(0x7f0000000300)}}, 0x18) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x111200) fsetxattr(r1, &(0x7f0000000440)=@random={'trusted.', '\x00'}, &(0x7f0000000480)='/dev/audio#\x00', 0xc, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="160000d195d0a4503f6000599d799dcf0d3cea20ea153735254f367cbd280596525fe68fc9e3bac043ebdaf55a38dcde5f1464f8d540a12c624b51bac1823c24d2dd66aaa6194948d0f48e9b5e88"], &(0x7f0000000100)=0x1e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x2, 0x7f, 0x40, 0x9, 0xff}, &(0x7f0000000140)=0x1e3) [ 796.181679] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') clock_gettime(0xfffffffffffffffd, &(0x7f0000000200)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f00000001c0)={0x1, {r3, r4+30000000}, 0x7f, 0x1}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:00 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000000c0)) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 796.247956] kernel msg: ebtables bug: please report to author: Wrong size 00:52:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:00 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8981, &(0x7f0000000000)) 00:52:00 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af03, &(0x7f0000000080)) [ 796.298701] XFS (loop5): Mounting V4 Filesystem [ 796.333753] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 796.342278] XFS (loop5): Log size out of supported range. [ 796.347977] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc05], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:00 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000180), 0x10) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x100) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) 00:52:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e2, 0xfffefffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x48001) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xe5, "e88f147e62b60de24eb6cb733fbf96ddad0fd0c6fd1d1be0e614170d2d4327656a04ed14be52185fe33fe51ac6b4e36f7987d4bc3755e4579157b8d4e902b27971917dbb9c579486e053cdb0cd596f749207732e8fdf8054790af976da85c5cfd1bb83e67fbf135ad91a1602be8b6ef1a37b927e7cba9fba4bcae67bfea5f24cb7a7983677176cd1432261d1141c856dbe5d006abe9669d2f41daae37c6e49f58776c407b842f5f5e3e512f21014295aa21849f4841776783e94c507beb93749d0785288978b12b46975c27a23890887ec338b70637dbe1ac1284e5de119419a57e52fa091"}, &(0x7f00000000c0)=0xed) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000100)=r2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7bd91397917daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}, 0x1}, 0x0) [ 796.459217] XFS (loop5): Invalid block length (0x1) for buffer [ 796.465545] XFS (loop5): empty log check failed [ 796.470298] XFS (loop5): log mount/recovery failed: error -12 [ 796.564711] XFS (loop5): log mount failed [ 796.635671] XFS (loop5): Mounting V4 Filesystem [ 796.641568] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 796.650014] XFS (loop5): Log size out of supported range. [ 796.655735] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 796.688854] XFS (loop5): Invalid block length (0x1) for buffer [ 796.695053] XFS (loop5): empty log check failed [ 796.699831] XFS (loop5): log mount/recovery failed: error -12 [ 796.706620] XFS (loop5): log mount failed 00:52:01 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:01 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x5421, &(0x7f0000000000)) 00:52:01 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffa, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x91ffffff, @loopback={0x0, 0x1}}, 0x1c) 00:52:01 executing program 2: prctl$void(0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) 00:52:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:01 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89ef, &(0x7f00000000c0)="6719c994b198d39d7c0a8f029165616fb4687eb8378485fedf1f91ec0dee5f8743c1228c980c7a76d5c15e167d6d064ef5d88eafa0b5e155cb68521d8cd4bd567e3cce0a6767129405a3029005228852f49ce1fd4a823695c81f11648686b5407f484a8185f855d84b22d0c262213fec67d3f94fbe3ad2aa6f78660da54441b04659f3ec2f9dc9deca6aa7c928eb427d6b4949c2a21cba04895f38339e4f413f9e13dd0c92a3bfd4820cbaea9f8cb71b4ee3ea0ca7f4078c00d4fd60f0c4d2fc06f57118d628a03e2f2b8e576566234ada2340a8c782622da863d4ee83ae09d5c5f82e59c3cf71895190f7af967b3db1") connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 797.155277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x0, 0x0, 0x0, 0x2000000000000000, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfd, 0x8100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffff}, 0x13f, 0x1008}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x63f7, 0x100000000, "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", 0x2f, 0x2728bc0d, 0x4, 0xb5b0, 0x3, 0x1, 0xfff}, r3}}, 0x120) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) finit_module(r4, &(0x7f0000000340)='selflo$F,system\x00', 0x0) 00:52:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:01 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d3, &(0x7f0000000000)) 00:52:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x2) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8d, 0x0) io_submit(r2, 0x286, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x9e, r0, &(0x7f00000000c0)="53502e703d4cb2413b661f86558d70a06f7a211a30e825495437ac554919c6b05a55a2604a3fb46fa1f60cb74e63a674394ebaa2657a2fda065bf49943aebad7fd571477a5a20e3f62ba4ad870a80c8b39a4f9", 0x0, 0x90fd, 0x0, 0x1, r3}]) [ 797.267877] XFS (loop5): Mounting V4 Filesystem [ 797.286511] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 797.294999] XFS (loop5): Log size out of supported range. [ 797.300640] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:01 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = request_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)='\x00', 0xfffffffffffffffb) keyctl$update(0x2, r1, &(0x7f0000000140), 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 797.315329] XFS (loop5): Invalid block length (0x1) for buffer [ 797.321480] XFS (loop5): empty log check failed [ 797.326252] XFS (loop5): log mount/recovery failed: error -12 00:52:01 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc020660b, &(0x7f0000000000)) [ 797.397348] XFS (loop5): log mount failed 00:52:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:01 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x9a, "86bf4712a762ee54bb7aebda38f6b525063e2e6e26e4bf569d7da03bcbd6b058499211a981bd874d04a4756d022d644bce0760609ff3a341e87af2c80bc2c0d126f0a276ba780fbba1dac43ea70b17975b6b3af885d9ef47aa5e564e78312a6e559392d353ed54b194b197b4933b25bf02d4da6ecd085578e47da322c6d3f78aa9111746de88074e6f6d026e913121d128926fbfaeb0e2e31f02"}, &(0x7f0000000180)=0xa2) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r3, 0xff}, 0x8) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c00000053651c6bbc6ccce53878642d22427408cfaa7dfd03b54168f97c3d3ea3e5d6341aea7e87803327c45c4a7e45f3149061be9c168f7f66f417e6625071ddf14500bf4f5d4799889ee8271145a706bb2f5ed38dff086008b17a193539cac6b01beacc961f89af2ca3b741efb6c3196bc1994ccd452ea2a5668362443c4e095b86fa90b02b95fca03dc29e9d6c6f", @ANYRES16=r4, @ANYBLOB="21042fbd7000fddbdf25050000000800040004000000"], 0xffffffffffffff00}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl$int_in(r0, 0x5421, &(0x7f0000000540)=0x4) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000000)={0x0, 0x2e}) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, r4, 0x100, 0x70bd28, 0x25dfdbfb, {0x6}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x509}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) [ 797.523725] XFS (loop5): Mounting V4 Filesystem [ 797.541634] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 797.550168] XFS (loop5): Log size out of supported range. [ 797.555799] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 797.620469] XFS (loop5): AIL initialisation failed: error -12 [ 797.630562] XFS (loop5): log mount failed 00:52:02 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:02 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8940, &(0x7f0000000000)) 00:52:02 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r0, 0x0, 0xb612, 0x3ff) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={0x0}, &(0x7f0000000640)=0x8) sendmmsg$inet_sctp(r0, &(0x7f00000008c0)=[{&(0x7f0000000040)=@in={0x2, 0x4e22, @loopback=0x7f000001}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000140)="207583453730a415fb648b0b1f7ecf31094db7050b9c01d1e4f8972e160af5086e82b41f10111f76789ac31cf8bdeedfc232f7558a8e236cc82f81ed8262e8707582b299f1807ff5d7b26dd39b1f8801989b214adaa761c9c6a4fd075729db", 0x5f}], 0x1, 0x0, 0x0, 0x2400c014}, {&(0x7f00000001c0)=@in6={0xa, 0x4e24, 0x10000, @empty, 0x9}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000200)="251016e3cc3b3cb777586df896066111a56221f88c9932fa888041e4be75d57c6e00e60fbb55e86c2f7a8c10f2db2cdb562c45631fbf854d77ecaf012c5b1496ecaad992a74201d98c8ceeb03beab7562c39b6440f0ec65a42c3db1af70c755fbb782383c041bf40bb1e9cf7fd2138fb988d81386be6eea6da3a993b789db343074ab4fe934cce7dca59ffb381252c8bbf6b434d1474b3161c40c71935f7a4e92eed1b458d82349d348a73d9475aefeecb235ba70a72585485ac1bdf", 0xbc}, {&(0x7f00000002c0)="0f9f53a0e56b417ca998c4df94b3321ad7da0753fe20", 0x16}, {&(0x7f0000000300)="e13c966201f50e61b99d4a2decd130737e5e34d8c34827da2dadc7866f66b20a3e23fefa6aa1111c92b9f1b0072948d14b1841bc29674d58434755c3e1e471fd9a8cf371aa0282a41902ae55df3d1e398cfb67220d96286acb87935f533960eac625b8e1bcc77712628268c6cdb4de41d9b5359c350438d8b05eafb35b33e749a24b1841fb8fa748a205b9d3adf093c9b12cd5729ee275eca6b80e764f21dad5b964e3c95effb247f9a9a4a518badc64912a8882f680be07172f8dba72a38662dfe391f6cf1a991bce7fc34467f83a54a07434aacae2ec19209f91f60ea3b90357d73a8694475a9c", 0xe8}, {&(0x7f0000000400)="f8eb216f528febc1daa49e4cd4791df096bbcb5f44a19d1f1c0917c45847153b6612727df058f22ff39b6e9ef7df45b2357943f7c738e2001254e9d4689d53c870e37f2d5492", 0x46}, {&(0x7f0000000480)="1b5384f8c57ee4c13adf336a11b847cecadaaeaae74330f6b4295e016d729535ad3e4b52634c6bbdffb6ad09197b41493b66d1cac51763847225066e17ae04b0f23c6a9be9c5c2fc5658ed7b06a719bf5a5d8116351d95d66fc697276f24001aa38639919608594868dbcb3a89c5c339", 0x70}, {&(0x7f0000000500)="575c574a6915b9f4860b76c242e9df6fda51dadf224fd6", 0x17}, {&(0x7f0000000540)="387a62b208163883", 0x8}], 0x7, &(0x7f0000000680)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback=0x7f000001}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x40000000000000}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x4}}, @dstaddrv4={0x18, 0x84, 0x7, @remote={0xac, 0x14, 0x14, 0xbb}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x7fff, 0x8201, 0x80000000, 0x0, 0x4, 0x6, 0x0, r1}}, @init={0x18, 0x84, 0x0, {0xfffffffffffff653, 0x0, 0xc3b, 0x3166}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x8}}], 0xc0, 0x90}, {&(0x7f0000000740)=@in6={0xa, 0x4e23, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}, 0x1c, &(0x7f0000000840)=[{&(0x7f0000000780)="4ab34a85e94eaf2c98ae3359b31deab5eaec87dd7c97d97521feaef8a4f3c42a0be28cb97855d202aa5cde7bb77b7eb4ac5e81354c52bf", 0x37}, {&(0x7f00000007c0)="84c5cf6e7964eb9951ab092509b1f48b4e88bc36af0b079d4819ea7316c02b5bb9ad7fc723d1fd740c2de6f63ce8fbcb9b3752643c618b16a39de67a5417e7a54c3cbcfb8d324db7359b346388d254ad6a0f4e53a7562bcd656a1c40b82d8555d6f23aae961a875367d653a59edd27dd55d630d9623d3b99ed3500f1", 0x7c}], 0x2, &(0x7f0000000880)=[@init={0x18, 0x84, 0x0, {0x3, 0x280, 0xfffffffffffffef4, 0x5}}, @init={0x18, 0x84, 0x0, {0xffffffffc07b3b51, 0xfffffffffffffe01, 0x2, 0x200}}], 0x30}], 0x3, 0x10) write$cgroup_int(r0, &(0x7f0000000000)={[0x0]}, 0xfdaf) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0xfffffffffffffffe}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) 00:52:02 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0xfffffea1) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'lo\x00', 0x80000001}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x11000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:02 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0xc0045877, &(0x7f0000000000)) [ 798.097880] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 798.160549] XFS (loop5): Mounting V4 Filesystem [ 798.192288] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 798.200812] XFS (loop5): Log size out of supported range. [ 798.206426] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 798.232494] XFS (loop5): Invalid block length (0x1) for buffer 00:52:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) r3 = gettid() setpgid(r2, r3) 00:52:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:02 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x80000000}}, 0x3, 0x4, 0x1, 0x4, 0x200}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r1, 0x247}, &(0x7f0000000200)=0x8) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000040)={0x4, 0xd000, 0x1f, 0x8, 0x8000}) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x64a00, 0x0) mmap$binder(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x0, 0x8012, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ff9000/0x1000)=nil) 00:52:02 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) clock_gettime(0x0, &(0x7f0000004c40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004ac0)=[{{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/180, 0xb4}, {&(0x7f0000000200)=""/131, 0x83}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/216, 0xd8}, {&(0x7f00000013c0)=""/117, 0x75}, {&(0x7f0000001440)=""/101, 0x65}, {&(0x7f00000014c0)=""/80, 0x50}], 0x7, &(0x7f00000015c0)=""/231, 0xe7, 0xbaee}, 0x800000000000}, {{&(0x7f00000016c0)=@generic, 0x80, &(0x7f0000000040)=[{&(0x7f0000001740)=""/4096, 0x1000}], 0x1, &(0x7f0000002740)=""/238, 0xee, 0xffff}, 0x2}, {{&(0x7f0000002840)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000028c0)=""/147, 0x93}, {&(0x7f0000002980)=""/23, 0x17}, {&(0x7f00000029c0)=""/10, 0xa}], 0x4, 0x0, 0x0, 0x5}, 0x1}, {{&(0x7f0000002a40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002ac0)=""/166, 0xa6}, {&(0x7f0000002b80)=""/165, 0xa5}, {&(0x7f0000002c40)=""/87, 0x57}, {&(0x7f0000002cc0)=""/5, 0x5}, {&(0x7f0000002d00)=""/229, 0xe5}, {&(0x7f0000002e00)=""/231, 0xe7}, {&(0x7f0000002f00)=""/11, 0xb}, {&(0x7f0000002f40)=""/150, 0x96}, {&(0x7f0000003000)=""/180, 0xb4}, {&(0x7f00000030c0)=""/62, 0x3e}], 0xa, &(0x7f00000031c0)=""/4096, 0x1000, 0x157}, 0x53}, {{&(0x7f00000041c0)=@xdp, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004240)=""/88, 0x58}, {&(0x7f00000042c0)=""/208, 0xd0}, {&(0x7f00000043c0)=""/36, 0x24}, {&(0x7f0000004400)=""/135, 0x87}, {&(0x7f00000044c0)=""/4, 0x4}, {&(0x7f0000004500)=""/178, 0xb2}, {&(0x7f00000045c0)=""/42, 0x2a}, {&(0x7f0000004600)=""/148, 0x94}], 0x8, 0x0, 0x0, 0x5}, 0x7fff}, {{&(0x7f0000004740)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000049c0)=[{&(0x7f00000047c0)=""/74, 0x4a}, {&(0x7f0000004840)=""/81, 0x51}, {&(0x7f00000048c0)=""/163, 0xa3}, {&(0x7f0000004980)=""/39, 0x27}], 0x4, &(0x7f0000004a00)=""/163, 0xa3}, 0x7f}], 0x6, 0x2002, &(0x7f0000004c80)={r1, r2+30000000}) recvmsg(r0, &(0x7f0000006440)={&(0x7f0000005280)=@hci={0x0, 0x0}, 0x80, &(0x7f0000006400)=[{&(0x7f0000005300)=""/237, 0xed}, {&(0x7f0000005400)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x7}, 0x40000000) r5 = syz_open_dev$mouse(&(0x7f0000004d00)='/dev/input/mouse#\x00', 0x80000001, 0x400000) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x1) sendmsg$nl_route_sched(r3, &(0x7f0000006500)={&(0x7f0000004cc0)={0x10, 0x0, 0x0, 0x4020001}, 0xc, &(0x7f00000064c0)={&(0x7f0000006480)=@newqdisc={0x34, 0x24, 0x100, 0x70bd28, 0x25dfdbfc, {0x0, r4, {0xffff, 0xd}, {0x6, 0xffe1}, {0xf, 0xfff1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x1ff}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 00:52:02 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x40049409, &(0x7f0000000000)) [ 798.238667] XFS (loop5): empty log check failed [ 798.243594] XFS (loop5): log mount/recovery failed: error -12 [ 798.271170] XFS (loop5): log mount failed 00:52:02 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x4, @my=0x0}, 0xb, 0x0) 00:52:02 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x2, &(0x7f0000000000)) [ 798.433938] XFS (loop5): Mounting V4 Filesystem 00:52:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4004000008912, &(0x7f0000000180)="2957e1311f16f477671070653004523ba727b3bc11a285a99b8b7550b47efb8d033792520fe37dd9f118e5cae81bb1371b647e72ff2c99911d4f506935d7d26d8f4d52ff00ac8c2ba235eb5289d25e0e6bfcb0a12ea94423de4ceaed5e7eabe2c7026d6e71edfe5d4aec752272f73b016e2216a7009815ae8e3297e3248846657818d3a0dade55af4d3f9fcfe9c40af46b32d5b9cc607e3c672be8d70d66315508f35858f84529cdca3f") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2280040, 0x0) fcntl$setstatus(r1, 0x4, 0x44000) ioctl$int_in(r1, 0x80000080044dff, &(0x7f0000001000)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000000c0)=0x1ff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40000, 0x0) [ 798.455257] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 798.463733] XFS (loop5): Log size out of supported range. [ 798.469352] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 798.545765] XFS (loop5): AIL initialisation failed: error -12 [ 798.563661] XFS (loop5): log mount failed 00:52:03 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:03 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = getpgid(0x0) prctl$setptracer(0x59616d61, r1) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:03 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000080)=0xfffffffffffffffd) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000000)={0x8004, 0x35, 0x0, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000140)={{0x2, 0x4e20, @rand_addr=0x81}, {0x307, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xf}}, 0x0, {0x2, 0x4e20, @rand_addr=0x81}, 'bpq0\x00'}) dup3(r1, r2, 0x0) r3 = dup2(r2, r0) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f00000000c0)) 00:52:03 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x8982, &(0x7f0000000000)) 00:52:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x8dffffff, @loopback={0x0, 0x1}}, 0x1c) 00:52:03 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 799.018487] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 799.108457] XFS (loop5): Mounting V4 Filesystem [ 799.121984] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 799.130479] XFS (loop5): Log size out of supported range. [ 799.136087] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 799.152690] XFS (loop5): Invalid block length (0x1) for buffer [ 799.158860] XFS (loop5): empty log check failed [ 799.163616] XFS (loop5): log mount/recovery failed: error -12 [ 799.179958] XFS (loop5): log mount failed [ 799.221423] XFS (loop5): Mounting V4 Filesystem [ 799.226851] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 799.235547] XFS (loop5): Log size out of supported range. [ 799.241153] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 799.255847] XFS (loop5): Invalid block length (0x1) for buffer [ 799.262100] XFS (loop5): empty log check failed [ 799.266863] XFS (loop5): log mount/recovery failed: error -12 [ 799.274966] XFS (loop5): log mount failed 00:52:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2003ffc) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x5, 0x7fffffff, 0x1, 'queue1\x00', 0xff}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x2000000000000000, 0x0, 'queue1\x00'}) close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:03 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x89a1, &(0x7f0000000000)) 00:52:03 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:03 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket(0x1, 0x7, 0xffffffffffffffff) sendmsg(r1, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f0000000300), 0x0, &(0x7f000016cf61)}, 0x0) recvmsg$kcm(r1, &(0x7f0000008000)={&(0x7f0000c1d000)=@ax25, 0x10, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1, &(0x7f0000c21000)}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) recvmmsg(r1, &(0x7f00000035c0)=[{{&(0x7f0000002880)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002bc0)=""/60, 0x3c}], 0x1, &(0x7f0000002c80)=""/123, 0x7b}}, {{&(0x7f0000002d00)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002d80)=""/58, 0x3a}], 0x1, 0x0, 0x1f}}], 0x3fffffffffffd23, 0x3, &(0x7f0000001340)={0x0, r2+30000000}) 00:52:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x40020000, @loopback={0x0, 0x1}}, 0x1c) 00:52:03 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) inotify_init1(0x800) [ 799.489470] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 799.509552] XFS (loop5): Mounting V4 Filesystem [ 799.542991] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 799.551502] XFS (loop5): Log size out of supported range. [ 799.557131] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 799.592487] XFS (loop5): Invalid block length (0x1) for buffer [ 799.598646] XFS (loop5): empty log check failed [ 799.603408] XFS (loop5): log mount/recovery failed: error -12 [ 799.621579] XFS (loop5): log mount failed [ 799.683777] XFS (loop5): Mounting V4 Filesystem [ 799.692720] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 799.701210] XFS (loop5): Log size out of supported range. [ 799.706919] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 799.725632] XFS (loop5): Invalid block length (0x1) for buffer [ 799.731806] XFS (loop5): empty log check failed [ 799.736576] XFS (loop5): log mount/recovery failed: error -12 [ 799.745214] XFS (loop5): log mount failed 00:52:04 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:04 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x89a0, &(0x7f0000000000)) 00:52:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:04 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x7) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x8c, r2, 0x12, 0x70bd27, 0x25dfdbfb, {0x1}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20004050}, 0x4040) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffff}, 0x111}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000680)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r1}}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}}, {0x2, 0x0, 0x7c96, @local={0xfe, 0x80, [], 0xaa}}, r1}}, 0x48) 00:52:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c653080", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x9, @loopback={0x0, 0x1}}, 0x1c) 00:52:04 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3f, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x8c, r3, 0x20, 0x70bd2b, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20008000}, 0x4040040) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x200, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000300)=0x7f, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x4) close(r1) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 799.986099] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:04 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xfffffdfd}) [ 800.081876] XFS (loop5): Mounting V4 Filesystem [ 800.091089] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 800.099930] XFS (loop5): Log size out of supported range. [ 800.105563] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10000012, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bf120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0xffffffffffffffff, 0x199, 0x0, 0x2, 0x0, [], 0x0, 0xa}, 0x48) 00:52:04 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x800008000005476, &(0x7f0000000040)=0x8001) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 800.192211] XFS (loop5): Invalid block length (0x1) for buffer [ 800.198376] XFS (loop5): empty log check failed [ 800.203147] XFS (loop5): log mount/recovery failed: error -12 [ 800.212874] XFS (loop5): log mount failed 00:52:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc050000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:04 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xfdfdffff00000000}) [ 800.322618] XFS (loop5): Mounting V4 Filesystem [ 800.329366] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 800.339405] XFS (loop5): Log size out of supported range. [ 800.345059] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 800.414304] XFS (loop5): AIL initialisation failed: error -12 [ 800.429958] XFS (loop5): log mount failed 00:52:05 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:05 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xfdfdffff}) 00:52:05 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004900)=[{{&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) recvfrom$inet6(r1, &(0x7f0000000300)=""/4096, 0x1000, 0x10000, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x10000}, 0x1c) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f00000001c0)) 00:52:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0R', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xce00000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000080)=0x80000001) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000280)) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000180)=""/87, 0x57}, &(0x7f0000000200), 0x44}, 0x20) [ 800.999894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:05 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfdfdffff}) 00:52:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 801.056277] XFS (loop5): Mounting V4 Filesystem [ 801.089750] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 801.098297] XFS (loop5): Log size out of supported range. [ 801.104078] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:05 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdfd}) 00:52:05 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) [ 801.213135] XFS (loop5): Invalid block length (0x1) for buffer [ 801.219381] XFS (loop5): empty log check failed [ 801.224124] XFS (loop5): log mount/recovery failed: error -12 [ 801.233470] XFS (loop5): log mount failed 00:52:05 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80000, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000180)=0x6) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0x40, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000200)={0x4, 0x73, 0x0, 0x5, 0x525, 0x4, 0x0, 0x2, 0xc0, 0x100000000, 0xbabf, 0x86}) listen(r0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000140)={0x9421, 0x8}) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 801.381791] XFS (loop5): Mounting V4 Filesystem 00:52:05 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfdfdffff00000000}) 00:52:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 801.406999] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 801.415522] XFS (loop5): Log size out of supported range. [ 801.421173] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 801.489406] XFS (loop5): AIL initialisation failed: error -12 [ 801.497437] XFS (loop5): log mount failed 00:52:06 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:06 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x0) eventfd(0xfffffffffffffffc) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x80000, 0x0) openat(r2, &(0x7f0000000400)='./file0\x00', 0xc6a42, 0xa) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0xfffffffffffffffe, @host=0x2}, 0xffffffc9) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0, 0x7, 0x1}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000440)={r4, 0xc3}, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000f4ff647602f2d9c0b3f100f449ea05de944e67e87989f7092eaa143914822fdb2bd38a5ad05765cd24881c7bf6f161ed2b2e3cade18ae4ff083af9db06566c88b0ac27f0bd3aa419b2c966af48ee0c513111001a20d7409bdc8746a7a95a1224d027dda2a727dda3371bb536911c53bd046c0843ae90efe546b900dd0ef9d8da6f9d3f58b02daeb456733237175897a019278643325f92e46fa68979302c22f4cf717c047af3d0f2d28726b4128fc08f41cbc577076aef310610f0873b460b8a07"], 0x8) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x800) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0xc018620b, &(0x7f0000000100)={r6}) ioctl$sock_inet6_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xd300, @loopback={0x0, 0x1}}, 0x1c) 00:52:06 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:52:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530ec", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 801.910480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 801.979270] XFS (loop5): Mounting V4 Filesystem 00:52:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000180)="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") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400000, 0x0) setns(r3, 0x58000000) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'ipddp0\x00', 0x1800}) close(r0) dup3(r0, r3, 0x80000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:06 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:52:06 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) listen(r0, 0x2) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) write$binfmt_elf32(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200, 0x7, 0x6, 0x16a6, 0x5, 0x2, 0x3e, 0x67b2, 0x38c, 0x38, 0x201, 0x4, 0x8, 0x20, 0x1, 0x80, 0x7, 0x2}, [{0x7, 0x9, 0x9, 0xd9c1, 0x1ff, 0xff, 0x1000, 0x8}, {0x6, 0x5, 0x7, 0xffffffff7fffffff, 0x9, 0x7, 0x2}], "d669b2fbf25e4ce21bb88e", [[], [], [], [], []]}, 0x583) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000200)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x4, 0x3, 0x2, {0xa, 0x4e20, 0xfffffffffffff08a, @mcast1={0xff, 0x1, [], 0x1}, 0x8}}}, {&(0x7f0000000140)=""/86, 0x56}, &(0x7f0000000040), 0x24}, 0xa0) 00:52:06 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 802.009372] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 802.018049] XFS (loop5): Log size out of supported range. [ 802.023679] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 802.066361] XFS (loop5): Invalid block length (0x1) for buffer [ 802.072492] XFS (loop5): empty log check failed [ 802.077238] XFS (loop5): log mount/recovery failed: error -12 00:52:06 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:52:06 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 802.135942] XFS (loop5): log mount failed 00:52:06 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 802.191805] XFS (loop5): Mounting V4 Filesystem [ 802.204277] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 802.212813] XFS (loop5): Log size out of supported range. [ 802.218533] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 802.230716] XFS (loop5): Invalid block length (0x1) for buffer [ 802.236801] XFS (loop5): empty log check failed 00:52:06 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0xfffffdfd}) [ 802.241561] XFS (loop5): log mount/recovery failed: error -12 [ 802.248468] XFS (loop5): log mount failed 00:52:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 802.397297] XFS (loop5): Mounting V4 Filesystem [ 802.409494] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 802.417982] XFS (loop5): Log size out of supported range. [ 802.423614] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 802.443944] XFS (loop5): Invalid block length (0x1) for buffer [ 802.450090] XFS (loop5): empty log check failed [ 802.454833] XFS (loop5): log mount/recovery failed: error -12 [ 802.461670] XFS (loop5): log mount failed [ 802.532335] XFS (loop5): Mounting V4 Filesystem [ 802.544061] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 802.552598] XFS (loop5): Log size out of supported range. [ 802.558209] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 802.571879] XFS (loop5): Invalid block length (0x1) for buffer [ 802.577961] XFS (loop5): empty log check failed [ 802.582697] XFS (loop5): log mount/recovery failed: error -12 [ 802.589321] XFS (loop5): log mount failed 00:52:07 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:07 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0xfdfdffff00000000}) 00:52:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xcb00, @loopback={0x0, 0x1}}, 0x1c) 00:52:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 802.874388] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 802.934120] XFS (loop5): Mounting V4 Filesystem [ 802.942400] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 802.950876] XFS (loop5): Log size out of supported range. [ 802.956518] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 803.008790] XFS (loop5): Invalid block length (0x1) for buffer [ 803.015093] XFS (loop5): empty log check failed [ 803.019856] XFS (loop5): log mount/recovery failed: error -12 [ 803.036973] XFS (loop5): log mount failed [ 803.087571] XFS (loop5): Mounting V4 Filesystem [ 803.092985] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 803.101510] XFS (loop5): Log size out of supported range. [ 803.107417] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 803.120510] XFS (loop5): Invalid block length (0x1) for buffer [ 803.126644] XFS (loop5): empty log check failed [ 803.131388] XFS (loop5): log mount/recovery failed: error -12 [ 803.139625] XFS (loop5): log mount failed 00:52:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x1400) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x7d}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x10000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000180)=""/110) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:07 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0xfdfdffff}) 00:52:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:07 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) fcntl$notify(0xffffffffffffffff, 0x406, 0x284) 00:52:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x18020000, @loopback={0x0, 0x1}}, 0x1c) 00:52:07 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xfdfdffff}) [ 803.380955] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:07 executing program 2: r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 803.462223] XFS (loop5): Mounting V4 Filesystem [ 803.481958] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 803.490435] XFS (loop5): Log size out of supported range. [ 803.496070] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 803.594474] XFS (loop5): Invalid block length (0x1) for buffer [ 803.600728] XFS (loop5): empty log check failed [ 803.605467] XFS (loop5): log mount/recovery failed: error -12 [ 803.615362] XFS (loop5): log mount failed [ 803.682887] XFS (loop5): Mounting V4 Filesystem [ 803.689587] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 803.698061] XFS (loop5): Log size out of supported range. [ 803.703665] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 803.716638] XFS (loop5): Invalid block length (0x1) for buffer [ 803.722721] XFS (loop5): empty log check failed [ 803.727447] XFS (loop5): log mount/recovery failed: error -12 [ 803.735876] XFS (loop5): log mount failed 00:52:08 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:08 executing program 6: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x4) listen(0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:08 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xfffffdfd}) 00:52:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x11, @loopback={0x0, 0x1}}, 0x1c) 00:52:08 executing program 2: r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) [ 803.869841] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000040)=""/28, 0x1c) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x200) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x25, @time, 0x8, {0x3, 0x9}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x6, {0x4f, 0x9, 0xffa8, 0x1ff, 0x0, 0x100}, 0x7, 0x1}, 0xe) 00:52:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530fa", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:08 executing program 2: r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:08 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xfdfdffff00000000}) 00:52:08 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) listen(r0, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000000c0)=0x1, 0x8) 00:52:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xcc, @loopback={0x0, 0x1}}, 0x1c) 00:52:08 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100)="f6bdd5e0343b7448be316c91800e4ab89ed69117c68faf5fc5152f927aa0610894a5b36d2fc3e175d32aeeced85c9b91d9bd7abe427357a60a39fd1e51f8ac2379449da7ae257eb5358ffa2a0be5045ff0db031d62749468795e288d1e40708a817e6da59499ee8068d2e0da405ec4a34a5c66a9e4a3feff5f89a1599457a5e07c34719e7c36", 0x86, 0x11, &(0x7f0000000240)={0x11, 0xc, r2, 0x1, 0x3, 0x6}, 0x14) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000000c0)=0x8000000) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:08 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffdfd}) [ 804.322799] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) [ 804.385433] XFS (loop5): Mounting V4 Filesystem [ 804.424687] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 804.433192] XFS (loop5): Log size out of supported range. [ 804.438946] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 804.527212] XFS (loop5): Invalid block length (0x1) for buffer [ 804.533377] XFS (loop5): empty log check failed [ 804.538162] XFS (loop5): log mount/recovery failed: error -12 [ 804.562669] XFS (loop5): log mount failed [ 804.623656] XFS (loop5): Mounting V4 Filesystem [ 804.634527] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 804.642996] XFS (loop5): Log size out of supported range. [ 804.648704] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 804.660772] XFS (loop5): Invalid block length (0x1) for buffer [ 804.666891] XFS (loop5): empty log check failed [ 804.671643] XFS (loop5): log mount/recovery failed: error -12 [ 804.678449] XFS (loop5): log mount failed 00:52:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfdfdffff00000000}) 00:52:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000180)) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) dup2(r2, r0) 00:52:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x0) fcntl$notify(r0, 0x406, 0x284) 00:52:09 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x2, r2, 0x1}) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xce, @loopback={0x0, 0x1}}, 0x1c) 00:52:09 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 804.825271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(0xffffffffffffffff, 0x406, 0x284) 00:52:09 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8080, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x1, [0xa56]}, &(0x7f0000000100)=0x6) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) getsockopt$inet_buf(r1, 0x0, 0x23, &(0x7f0000000200)=""/236, &(0x7f0000000140)=0xec) ioctl$KVM_RUN(r1, 0xae80, 0x0) listen(r0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x20000000000000) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfdfdffff}) 00:52:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 804.944110] XFS (loop5): Mounting V4 Filesystem [ 804.949929] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 804.958376] XFS (loop5): Log size out of supported range. [ 804.964482] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:09 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x100, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f00000000c0)="c0c7a4304e8997cdef2b6c223e5934a0174b54b23c3312d27c28adbe0b4e753acd38840daa7ae0342ef61d36ed9d", &(0x7f0000000200)=""/200}, 0x18) r2 = getgid() setgid(r2) [ 805.025170] XFS (loop5): Invalid block length (0x1) for buffer [ 805.031444] XFS (loop5): empty log check failed [ 805.036203] XFS (loop5): log mount/recovery failed: error -12 00:52:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xfdfdffff}) 00:52:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 805.094076] XFS (loop5): log mount failed 00:52:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x0) [ 805.228012] XFS (loop5): Mounting V4 Filesystem [ 805.258917] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 805.267536] XFS (loop5): Log size out of supported range. [ 805.273149] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 805.286376] XFS (loop5): AIL initialisation failed: error -12 [ 805.314228] XFS (loop5): log mount failed [ 805.638095] Unknown ioctl -2146950137 00:52:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:10 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffdfd}) 00:52:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:10 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x7f) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xfffffffffffffffc, @any=0xffffffff}, 0xfffffffffffffc30, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x100, 0x0) mkdirat(r2, &(0x7f0000000140)='./file0\x00', 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$TIOCNXCL(r3, 0x540d) listen(r1, 0x8) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x4) 00:52:10 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xf5ffffff00000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x0) 00:52:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:10 executing program 6: r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000040)=0x6e) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x5) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x4) listen(r1, 0x0) accept4$vsock_stream(r1, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\n', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:10 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 805.876645] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:10 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) 00:52:10 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETLED(r2, 0x4b32, 0x101) ioctl$KDMKTONE(r1, 0x4b30, 0x9) listen(r2, 0x2000000000004) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) sendmsg$can_bcm(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x1d, r3}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x3, 0x809, 0x6, {0x0, 0x2710}, {0x0, 0x2710}, {0x4, 0x6, 0x1f, 0x3}, 0x1, @canfd={{0x0, 0x2, 0x10001, 0xcb}, 0x16, 0x3, 0x0, 0x0, "a1323fb3b36430b3cab18da799ded999e3f81801945d6a2122428971911e6a32d89d4ba8a554ddd9a90adbd72aa94439dd1fadddaef3b8276f769338427f2e15"}}, 0x80}, 0x1, 0x0, 0x0, 0x4001}, 0x48001) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 805.936131] XFS (loop5): Mounting V4 Filesystem [ 805.942875] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 805.951326] XFS (loop5): Log size out of supported range. [ 805.956926] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 805.971886] XFS (loop5): Invalid block length (0x1) for buffer [ 805.978051] XFS (loop5): empty log check failed 00:52:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x0) [ 805.982895] XFS (loop5): log mount/recovery failed: error -12 [ 805.991258] XFS (loop5): log mount failed 00:52:10 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) [ 806.136006] XFS (loop5): Mounting V4 Filesystem [ 806.164544] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 806.173049] XFS (loop5): Log size out of supported range. [ 806.178670] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 806.221324] XFS (loop5): AIL initialisation failed: error -12 [ 806.228134] XFS (loop5): log mount failed 00:52:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:10 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x31, 0x2000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffff}, 0x117, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x94d, 0x40000000, "890d6effa925dc9edc851365ac3492cc390a5f65683c3c4e88b29a1cc8c1b0b051de9d7c6b6218102616b28f9858ad212aeb24500d308bf60249af4325f8e47b5f69c800d055b950e37a956732cd5b39c1a98e3c51de6f0ecb977c98233a182988e9500eda3b42c04d9fea31bde6660b5b84cedc7182ec1090870bfba368459ea0ae3e93d76b9d3b3ea93faae118e57833bd4bb31f97a3de815caee4c75d903930169cf865a42a567f1b4911062095d7d0fea1d4494842fbd4de75d9c096bf578951ad0a5f040002bd5771315ffb0061df8067063e0159bdc1fa183732d39a32f96b479229f55311a1c87a246e4b7e4ef66c16ff2964e023180fb5a39485ab33", 0x36, 0x4, 0x48, 0x80000000, 0x7, 0x6, 0x40}, r3}}, 0x120) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000400)={r2, 0x4}, &(0x7f00000003c0)=0x8) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0xfffffdfd}) 00:52:11 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:11 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) 00:52:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x2800000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0xfffffdfd}) 00:52:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:11 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5472, &(0x7f00000000c0)=0x400000000004) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 806.942486] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:11 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) 00:52:11 executing program 2 (fault-call:2 fault-nth:0): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) [ 807.017952] XFS (loop5): Mounting V4 Filesystem [ 807.027622] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 807.036129] XFS (loop5): Log size out of supported range. [ 807.041730] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 807.058651] XFS (loop5): Invalid block length (0x1) for buffer 00:52:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:11 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) [ 807.065110] XFS (loop5): empty log check failed [ 807.069910] XFS (loop5): log mount/recovery failed: error -12 [ 807.090404] XFS (loop5): log mount failed [ 807.197262] FAULT_INJECTION: forcing a failure. [ 807.197262] name failslab, interval 1, probability 0, space 0, times 0 [ 807.208669] CPU: 0 PID: 28482 Comm: syz-executor2 Not tainted 4.18.0-rc2+ #121 [ 807.216052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.225418] Call Trace: [ 807.228028] dump_stack+0x1c9/0x2b4 [ 807.231677] ? dump_stack_print_info.cold.2+0x52/0x52 [ 807.236885] ? unlock_page+0x1d1/0x2c0 [ 807.240801] should_fail.cold.4+0xa/0x1a [ 807.244889] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 807.250107] ? __lock_acquire+0x7fc/0x5020 [ 807.254373] ? find_held_lock+0x36/0x1c0 [ 807.258470] ? check_same_owner+0x340/0x340 [ 807.262809] ? rcu_note_context_switch+0x730/0x730 [ 807.267756] __should_failslab+0x124/0x180 [ 807.272007] should_failslab+0x9/0x14 [ 807.275831] kmem_cache_alloc_trace+0x2cb/0x780 [ 807.280519] ? do_raw_spin_unlock+0xa7/0x2f0 [ 807.284949] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 807.289573] ? __lock_is_held+0xb5/0x140 [ 807.293656] alloc_fdtable+0x89/0x280 [ 807.297480] expand_files.part.8+0x216/0x9c0 [ 807.301908] ? find_held_lock+0x36/0x1c0 [ 807.305990] ? iterate_fd+0x4b0/0x4b0 [ 807.309811] ? graph_lock+0x170/0x170 [ 807.313638] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 807.319193] ? graph_lock+0x170/0x170 [ 807.323018] ? __alloc_fd+0xbc/0x710 [ 807.326753] ? lock_release+0xa30/0xa30 [ 807.330753] ? lock_release+0xa30/0xa30 [ 807.334743] ? find_held_lock+0x36/0x1c0 [ 807.338921] ? __lock_is_held+0xb5/0x140 [ 807.343015] __alloc_fd+0x125/0x710 [ 807.346665] ? exit_files+0xb0/0xb0 [ 807.350311] ? kasan_check_read+0x11/0x20 [ 807.354474] ? rcu_is_watching+0x8c/0x150 [ 807.358634] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 807.363064] f_dupfd+0x225/0x3e7 [ 807.366443] ? __ia32_sys_dup+0x40/0x40 [ 807.370428] ? expand_files.part.8+0x9c0/0x9c0 [ 807.375025] ? wait_for_completion+0x8d0/0x8d0 [ 807.379626] do_fcntl+0xe62/0x14f0 [ 807.383177] ? f_getown+0xc0/0xc0 [ 807.386633] ? __fget_light+0x2f7/0x440 [ 807.390612] ? fget_raw+0x20/0x20 [ 807.394144] ? __sb_end_write+0xac/0xe0 [ 807.398126] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 807.403670] ? fput+0x130/0x1a0 [ 807.407128] ? ksys_write+0x1ae/0x260 [ 807.410934] ? __ia32_sys_read+0xb0/0xb0 [ 807.415002] ? security_file_fcntl+0x94/0xc0 [ 807.419425] __x64_sys_fcntl+0x177/0x1f0 [ 807.423497] do_syscall_64+0x1b9/0x820 [ 807.427386] ? finish_task_switch+0x1d3/0x890 [ 807.431889] ? syscall_return_slowpath+0x5e0/0x5e0 [ 807.436816] ? syscall_return_slowpath+0x31d/0x5e0 [ 807.441736] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 807.447103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 807.451935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.457113] RIP: 0033:0x455a99 [ 807.460597] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 807.480699] RSP: 002b:00007fcf079c2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 807.488405] RAX: ffffffffffffffda RBX: 00007fcf079c36d4 RCX: 0000000000455a99 [ 807.495657] RDX: 0000000000000284 RSI: 0000000000000406 RDI: 0000000000000014 [ 807.502910] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 807.510161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 807.517413] R13: 00000000004bbb59 R14: 00000000004c8bf8 R15: 0000000000000000 00:52:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000180)={{0x7, 0x3}, {0xfffffffffffffeff, 0x5}, 0x800, 0x0, 0xbd}) 00:52:11 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 00:52:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xd300000000000000, @loopback={0x0, 0x1}}, 0x1c) [ 807.655472] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:12 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:12 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) setsockopt(r1, 0x1626, 0x9, &(0x7f00000000c0)="9780ade22b3b14d672d343e2b901e0fbe2cb7492dd9d4e65fcc50e38a40b3cb6ab104a77de796b9fa90cef5a4211c631adc7c03ebb32d6e7fbceaecb06514b33896ab7df3556c61ead12710abeddd6ff17230a9a47fca4b3de79c789a91bc736048166a71632bcf2f19476c3682d681547d050eb7c7b27", 0x77) 00:52:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:12 executing program 2 (fault-call:2 fault-nth:1): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc8530100, @loopback={0x0, 0x1}}, 0x1c) 00:52:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:12 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 808.000823] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.001718] FAULT_INJECTION: forcing a failure. [ 808.001718] name failslab, interval 1, probability 0, space 0, times 0 [ 808.022496] CPU: 1 PID: 28543 Comm: syz-executor2 Not tainted 4.18.0-rc2+ #121 [ 808.029864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.039226] Call Trace: [ 808.041836] dump_stack+0x1c9/0x2b4 [ 808.045482] ? dump_stack_print_info.cold.2+0x52/0x52 [ 808.050690] ? kernel_text_address+0x79/0xf0 [ 808.055131] should_fail.cold.4+0xa/0x1a [ 808.059215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 808.064344] ? save_stack+0xa9/0xd0 [ 808.067990] ? save_stack+0x43/0xd0 [ 808.071629] ? kasan_kmalloc+0xc4/0xe0 [ 808.075536] ? find_held_lock+0x36/0x1c0 [ 808.079633] ? check_same_owner+0x340/0x340 [ 808.083975] ? rcu_note_context_switch+0x730/0x730 [ 808.088923] __should_failslab+0x124/0x180 [ 808.093186] should_failslab+0x9/0x14 [ 808.097006] kmem_cache_alloc_node_trace+0x26f/0x770 [ 808.102128] ? alloc_fdtable+0x89/0x280 [ 808.106122] __kmalloc_node+0x33/0x70 [ 808.109938] kvmalloc_node+0xb9/0xf0 [ 808.113663] alloc_fdtable+0xd9/0x280 [ 808.117479] expand_files.part.8+0x216/0x9c0 [ 808.121898] ? find_held_lock+0x36/0x1c0 [ 808.125971] ? iterate_fd+0x4b0/0x4b0 [ 808.129784] ? graph_lock+0x170/0x170 [ 808.133593] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 808.139136] ? graph_lock+0x170/0x170 [ 808.142941] ? __alloc_fd+0xbc/0x710 [ 808.146662] ? lock_release+0xa30/0xa30 [ 808.150647] ? lock_release+0xa30/0xa30 [ 808.154633] ? find_held_lock+0x36/0x1c0 [ 808.158707] ? __lock_is_held+0xb5/0x140 [ 808.162783] __alloc_fd+0x125/0x710 [ 808.166420] ? exit_files+0xb0/0xb0 [ 808.170052] ? kasan_check_read+0x11/0x20 [ 808.174294] ? rcu_is_watching+0x8c/0x150 [ 808.178453] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 808.182883] f_dupfd+0x225/0x3e7 [ 808.186268] ? __ia32_sys_dup+0x40/0x40 [ 808.190252] ? expand_files.part.8+0x9c0/0x9c0 [ 808.194849] ? wait_for_completion+0x8d0/0x8d0 [ 808.199451] do_fcntl+0xe62/0x14f0 [ 808.203006] ? f_getown+0xc0/0xc0 [ 808.206464] ? __fget_light+0x2f7/0x440 [ 808.210446] ? fget_raw+0x20/0x20 [ 808.213906] ? __sb_end_write+0xac/0xe0 [ 808.217890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 808.223430] ? fput+0x130/0x1a0 [ 808.226717] ? ksys_write+0x1ae/0x260 [ 808.230537] ? __ia32_sys_read+0xb0/0xb0 [ 808.234607] ? security_file_fcntl+0x94/0xc0 [ 808.239028] __x64_sys_fcntl+0x177/0x1f0 [ 808.243101] do_syscall_64+0x1b9/0x820 [ 808.246999] ? finish_task_switch+0x1d3/0x890 [ 808.251502] ? syscall_return_slowpath+0x5e0/0x5e0 [ 808.256435] ? syscall_return_slowpath+0x31d/0x5e0 [ 808.261379] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 808.266756] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 808.271613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.276802] RIP: 0033:0x455a99 [ 808.279983] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:52:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:12 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0xfffffffffffffffc) listen(r1, 0x7) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x4000, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000200)) r3 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) 00:52:12 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) 00:52:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc4ffffff, @loopback={0x0, 0x1}}, 0x1c) [ 808.299338] RSP: 002b:00007fcf079c2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 808.307838] RAX: ffffffffffffffda RBX: 00007fcf079c36d4 RCX: 0000000000455a99 [ 808.315115] RDX: 0000000000000284 RSI: 0000000000000406 RDI: 0000000000000014 [ 808.322387] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 808.329664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 808.336948] R13: 00000000004bbb59 R14: 00000000004c8bf8 R15: 0000000000000001 00:52:12 executing program 6: socketpair$inet6(0xa, 0xf, 0x3, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'ip6gretap0\x00', {0x2, 0x4e24, @rand_addr=0x3bf9}}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_team\x00', 0x10) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x4) listen(r1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'gre0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}) accept4$vsock_stream(r1, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 808.402857] XFS (loop5): Mounting V4 Filesystem [ 808.423518] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 808.432097] XFS (loop5): Log size out of supported range. [ 808.436328] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.437696] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x4, 0x800) close(r0) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000240)=0x5) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffff}, 0x2, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r4, 0x38}}, 0x10) 00:52:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:12 executing program 2 (fault-call:2 fault-nth:2): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:12 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000ab8b3ed70000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0000b100000000000000000000001f00"]) [ 808.515779] XFS (loop5): Invalid block length (0x1) for buffer [ 808.522127] XFS (loop5): empty log check failed [ 808.526881] XFS (loop5): log mount/recovery failed: error -12 [ 808.537693] XFS (loop5): log mount failed [ 808.630526] XFS (loop5): Mounting V4 Filesystem [ 808.637478] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 808.645982] XFS (loop5): Log size out of supported range. [ 808.646217] FAULT_INJECTION: forcing a failure. [ 808.646217] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 808.651585] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 808.663345] CPU: 1 PID: 28594 Comm: syz-executor2 Not tainted 4.18.0-rc2+ #121 [ 808.663358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.663362] Call Trace: [ 808.663392] dump_stack+0x1c9/0x2b4 [ 808.663412] ? dump_stack_print_info.cold.2+0x52/0x52 [ 808.663433] should_fail.cold.4+0xa/0x1a [ 808.663457] ? find_held_lock+0x36/0x1c0 [ 808.692739] XFS (loop5): Invalid block length (0x1) for buffer [ 808.694461] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 808.694489] ? lock_downgrade+0x8f0/0x8f0 [ 808.694510] ? find_held_lock+0x36/0x1c0 [ 808.694526] ? graph_lock+0x170/0x170 [ 808.694540] ? lock_acquire+0x1e4/0x540 [ 808.694558] ? lock_downgrade+0x8f0/0x8f0 [ 808.698210] XFS (loop5): empty log check failed [ 808.703363] __alloc_pages_nodemask+0x36e/0xdb0 [ 808.703386] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 808.707446] XFS (loop5): log mount/recovery failed: error -12 [ 808.711462] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 808.711486] ? rcu_read_unlock+0x35/0x70 [ 808.711515] ? check_same_owner+0x340/0x340 [ 808.719548] XFS (loop5): log mount failed [ 808.722549] cache_grow_begin+0x91/0x710 [ 808.722575] kmem_cache_alloc_node_trace+0x692/0x770 [ 808.722599] __kmalloc_node+0x33/0x70 [ 808.722620] kvmalloc_node+0xb9/0xf0 [ 808.722636] alloc_fdtable+0xd9/0x280 [ 808.722652] expand_files.part.8+0x216/0x9c0 [ 808.804686] ? find_held_lock+0x36/0x1c0 [ 808.808767] ? iterate_fd+0x4b0/0x4b0 [ 808.812577] ? graph_lock+0x170/0x170 [ 808.816393] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 808.821948] ? graph_lock+0x170/0x170 [ 808.825755] ? __alloc_fd+0xbc/0x710 [ 808.829482] ? lock_release+0xa30/0xa30 [ 808.833461] ? lock_release+0xa30/0xa30 [ 808.837426] ? find_held_lock+0x36/0x1c0 [ 808.841561] ? __lock_is_held+0xb5/0x140 [ 808.845617] __alloc_fd+0x125/0x710 [ 808.849233] ? exit_files+0xb0/0xb0 [ 808.852848] ? kasan_check_read+0x11/0x20 [ 808.856990] ? rcu_is_watching+0x8c/0x150 [ 808.861124] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 808.865530] f_dupfd+0x225/0x3e7 [ 808.868887] ? __ia32_sys_dup+0x40/0x40 [ 808.872845] ? expand_files.part.8+0x9c0/0x9c0 [ 808.877414] ? wait_for_completion+0x8d0/0x8d0 [ 808.881990] do_fcntl+0xe62/0x14f0 [ 808.885517] ? f_getown+0xc0/0xc0 [ 808.888951] ? __fget_light+0x2f7/0x440 [ 808.892911] ? fget_raw+0x20/0x20 [ 808.896364] ? __sb_end_write+0xac/0xe0 [ 808.900323] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 808.905848] ? fput+0x130/0x1a0 [ 808.909113] ? ksys_write+0x1ae/0x260 [ 808.912913] ? __ia32_sys_read+0xb0/0xb0 [ 808.916960] ? security_file_fcntl+0x94/0xc0 [ 808.921355] __x64_sys_fcntl+0x177/0x1f0 [ 808.925404] do_syscall_64+0x1b9/0x820 [ 808.929275] ? finish_task_switch+0x1d3/0x890 [ 808.933756] ? syscall_return_slowpath+0x5e0/0x5e0 [ 808.938936] ? syscall_return_slowpath+0x31d/0x5e0 [ 808.943855] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 808.949207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 808.954040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.959217] RIP: 0033:0x455a99 [ 808.962392] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:52:13 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x204) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:13 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0200000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001540)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001580)={r2, @dev={0xac, 0x14, 0x14, 0x1c}, @multicast2=0xe0000002}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vcan0\x00', r3}) [ 808.981636] RSP: 002b:00007fcf079c2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 808.989333] RAX: ffffffffffffffda RBX: 00007fcf079c36d4 RCX: 0000000000455a99 [ 808.996590] RDX: 0000000000000284 RSI: 0000000000000406 RDI: 0000000000000014 [ 809.003846] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 809.011100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 809.018351] R13: 00000000004bbb59 R14: 00000000004c8bf8 R15: 0000000000000002 00:52:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:13 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:13 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ipv6_route\x00') getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x1}, 0xc) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:13 executing program 2 (fault-call:2 fault-nth:3): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:13 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x4, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x2, 0x4, 0xb17, 0x1, r2}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f00000009c0)=ANY=[@ANYRES32]) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000003c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="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", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="4867f14466be619f0c28390432ded3b84bc01ed6261cab049c8049fca4975d0b0e3001d2c5100d8b43cc3573c1897aff3bfbb6dcc98c6561f43b675cae2000c01dd55047ca6d0343794200a4699f6203c7d6851a693ac2cd129c202b26c86533b12e902b4bed7a3ea6b4ca06f0814bdb8a5e462a3ea3fbcf302f9438c697bc36df6a43a1d4"], @ANYBLOB="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"]) 00:52:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 809.195475] XFS (loop5): Mounting V4 Filesystem [ 809.219730] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 809.228224] XFS (loop5): Log size out of supported range. [ 809.233911] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:13 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) pread64(r0, &(0x7f00000000c0)=""/235, 0xeb, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0xfffd) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 809.288992] FAULT_INJECTION: forcing a failure. [ 809.288992] name failslab, interval 1, probability 0, space 0, times 0 [ 809.300338] CPU: 1 PID: 28646 Comm: syz-executor2 Not tainted 4.18.0-rc2+ #121 [ 809.307707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.317074] Call Trace: [ 809.319690] dump_stack+0x1c9/0x2b4 [ 809.323345] ? dump_stack_print_info.cold.2+0x52/0x52 [ 809.328572] should_fail.cold.4+0xa/0x1a [ 809.332653] ? unwind_get_return_address+0x61/0xa0 00:52:13 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="0516e64f158ebad124f42571f4475093769f4ddd8d342e0e9d713ba3e1e7f4b54f1bddf9c6b86a8f8fbb24df68ef6397455e808db7ebc3adf268702862a970c1b4a3bcfdca9a2335725ce1ed9f47a56035c5b2935845210d52dd78d49506892aad724d84dd61c40e5821c717ccd71b7d4ba7482cf55612fd1d7e81322ba77fafd8ec9b36eea7da9a94836cb9f66d3c872c30f97208f021783cc01d116f4e78905e287320c6cce22e1174e5b857fccf"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:52:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe803, @loopback={0x0, 0x1}}, 0x1c) [ 809.337611] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 809.342747] ? save_stack+0xa9/0xd0 [ 809.346404] ? find_held_lock+0x36/0x1c0 [ 809.347603] XFS (loop5): Invalid block length (0x1) for buffer [ 809.350498] ? check_same_owner+0x340/0x340 [ 809.350522] ? rcu_note_context_switch+0x730/0x730 [ 809.350545] __should_failslab+0x124/0x180 [ 809.350569] should_failslab+0x9/0x14 [ 809.356570] XFS (loop5): empty log check failed [ 809.360859] kmem_cache_alloc_node_trace+0x26f/0x770 [ 809.360955] ? kasan_unpoison_shadow+0x35/0x50 [ 809.360981] __kmalloc_node+0x33/0x70 [ 809.365933] XFS (loop5): log mount/recovery failed: error -12 [ 809.370126] kvmalloc_node+0x65/0xf0 [ 809.370146] alloc_fdtable+0x145/0x280 [ 809.370168] expand_files.part.8+0x216/0x9c0 [ 809.376281] XFS (loop5): log mount failed [ 809.378607] ? find_held_lock+0x36/0x1c0 [ 809.378624] ? iterate_fd+0x4b0/0x4b0 [ 809.378639] ? graph_lock+0x170/0x170 [ 809.378665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 809.378682] ? graph_lock+0x170/0x170 [ 809.378693] ? __alloc_fd+0xbc/0x710 [ 809.378709] ? lock_release+0xa30/0xa30 [ 809.423705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.425752] ? lock_release+0xa30/0xa30 [ 809.425770] ? find_held_lock+0x36/0x1c0 [ 809.425790] ? __lock_is_held+0xb5/0x140 [ 809.425812] __alloc_fd+0x125/0x710 [ 809.425829] ? exit_files+0xb0/0xb0 [ 809.472451] ? kasan_check_read+0x11/0x20 [ 809.478880] ? rcu_is_watching+0x8c/0x150 [ 809.483057] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 809.487507] f_dupfd+0x225/0x3e7 [ 809.490905] ? __ia32_sys_dup+0x40/0x40 [ 809.494902] ? expand_files.part.8+0x9c0/0x9c0 [ 809.499511] ? wait_for_completion+0x8d0/0x8d0 [ 809.504123] do_fcntl+0xe62/0x14f0 [ 809.507690] ? f_getown+0xc0/0xc0 [ 809.511157] ? __fget_light+0x2f7/0x440 [ 809.515141] ? fget_raw+0x20/0x20 [ 809.518604] ? __sb_end_write+0xac/0xe0 [ 809.522627] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 809.528226] ? fput+0x130/0x1a0 [ 809.531522] ? ksys_write+0x1ae/0x260 [ 809.535334] ? __ia32_sys_read+0xb0/0xb0 [ 809.539411] ? security_file_fcntl+0x94/0xc0 [ 809.543846] __x64_sys_fcntl+0x177/0x1f0 [ 809.547923] do_syscall_64+0x1b9/0x820 [ 809.551842] ? syscall_return_slowpath+0x5e0/0x5e0 [ 809.556793] ? syscall_return_slowpath+0x31d/0x5e0 [ 809.561746] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 809.567133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 809.571999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.577200] RIP: 0033:0x455a99 [ 809.580392] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 809.599714] RSP: 002b:00007fcf079c2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 809.607437] RAX: ffffffffffffffda RBX: 00007fcf079c36d4 RCX: 0000000000455a99 [ 809.614721] RDX: 0000000000000284 RSI: 0000000000000406 RDI: 0000000000000014 [ 809.622007] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 809.629294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 00:52:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r1, &(0x7f0000000340)="64211a946bac1a0cf16882f967ae5aefe9a7deea5227f1453ea0f91d4a5fb1ffce5e8937cf44bb041b473865e89709eed35a1fffc2ab1717d5c6ae9b219a8b5f580d17f68dd26e75ebcf3dde4e8abebd49e2c5dbf7295a6a55cb99feaf389c3268ec599fbe42394a94c2d5d5a22923855536713b9e", &(0x7f00000003c0)=""/158}, 0x18) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008812, &(0x7f0000000180)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f00000004c0)=""/244) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r4, 0x8001}, &(0x7f00000002c0)=0x8) accept$inet(r3, &(0x7f0000000080)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 00:52:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:13 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x4000000000003, @my=0x0}, 0xfffffffffffffec9) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f00000088c0)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)="84", 0x1}], 0x1, &(0x7f0000001080)}, {0x0, 0x0, &(0x7f00000003c0)}], 0x2, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7000000000000, 0x12240) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f00000000c0)=0xb, 0x4) 00:52:13 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="63020766607eb9e6d122df291afda3867a8447412ae416ecde14aa848219d70125538e7176913aefb8502ad5270b0726221c28fffa446afc4b056431f387f9723664459f6cb6df7643d9fe86bfe7"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 809.636583] R13: 00000000004bbb59 R14: 00000000004c8bf8 R15: 0000000000000003 00:52:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0xaa00, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2000, 0x0) dup2(r2, r2) r3 = getpid() syz_open_procfs$namespace(r3, &(0x7f00000001c0)='ns/pid_for_children\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="a6b4aa435b64"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f00000000c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) [ 809.753863] XFS (loop5): Mounting V4 Filesystem [ 809.764368] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 809.772838] XFS (loop5): Log size out of supported range. [ 809.778447] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 809.837164] XFS (loop5): AIL initialisation failed: error -12 [ 809.851851] XFS (loop5): log mount failed 00:52:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 809.986149] XFS (loop5): Mounting V4 Filesystem [ 809.991643] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 810.000138] XFS (loop5): Log size out of supported range. [ 810.005843] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 810.018492] XFS (loop5): Invalid block length (0x1) for buffer [ 810.024602] XFS (loop5): empty log check failed [ 810.029425] XFS (loop5): log mount/recovery failed: error -12 [ 810.036377] XFS (loop5): log mount failed [ 810.058720] XFS (loop5): Mounting V4 Filesystem [ 810.065165] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 810.073605] XFS (loop5): Log size out of supported range. [ 810.079223] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 810.091336] XFS (loop5): Invalid block length (0x1) for buffer [ 810.097477] XFS (loop5): empty log check failed [ 810.102215] XFS (loop5): log mount/recovery failed: error -12 00:52:14 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:14 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x4000) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000200), 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000140)={r3, 0x3}, 0x8) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x81, 0x3, &(0x7f0000000540)=[{&(0x7f0000000300)="278bd1521709f0f4369c9bb2ee641db403a09f509c02c955da05b26135aa47d65ecaf491fda6cd1f14e3d55786f4a2ecceedec4bd62a5324bcb6ab6bda5f318e38a48514a3236d4f9bf7bdae6e0ef4e89f5ebb0df2c644afc898442169df21cdf8118c53401bda8f068b6acd4b3f099aa72d7d73a6b3f51b9b95ac898338ffa23f09488eee904b8c96804d2d1c67603a9aac6db2eb241bd959fe8ece1a6c35", 0x9f}, {&(0x7f00000003c0)="d597d78a68c34512cd9d946d8ec57418cb27344f5958d119c800c7866a0d1f3d7bd2dcdd223b016deb4ba3ad47530f7b43b1393801cd0c65f0409daacd7427d2e0111bf7e4d0ec900994120c9f02511465a5a533a6a16db2832be59cceb8e748b40bf587a1b704caa358a87489bca8ad05f9db0d47d8fe84efd86686549a44d9a2e6e2e40743c41709a821d50b0e4dd4d3847e39c9f0014f7df4b03b855ee0853e9818962467f558b3b9d9307847aa4c3f5d3aa704d108e3778d532b5457782a7baf3b61dd21bb08a83dbdf3a28976", 0xcf, 0x7ff}, {&(0x7f00000004c0)="0c34069025734ac1f6a88f82ac09cc85408d2862fd6f967f1e2981bec72b175afcb1774d7f15af7ba56f178c1273414bd3bf654c0b62876f6efaab2eb95f41ccea67d55f5a02be359035e0fdfaf503ff2981a4b9597d26f0ceee70f58356945f0643b0fe29422103611a9cb363", 0x6d, 0xeea}], 0x80, &(0x7f00000005c0)={[{@session={'session', 0x3d, [0x33, 0x7d, 0x33]}, 0x2c}, {@quiet='quiet', 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp855'}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp437'}, 0x2c}, {@part={'part', 0x3d, [0x0, 0x0, 0x3a, 0x36, 0x35]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp949'}, 0x2c}, {@dir_umask={'dir_umask', 0x3d, [0x36, 0x34, 0x35, 0x34, 0x32]}, 0x2c}, {@session={'session', 0x3d, [0x7e, 0x33, 0x7a, 0x37, 0x3f, 0x32, 0x2d]}, 0x2c}, {@part={'part', 0x3d, [0x32, 0x78, 0x33]}, 0x2c}]}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl(r1, 0x8, &(0x7f0000000040)="2304d6c4b38594d9af519f59022a157f25f696c5806261f482c88dca95d1860ddb6a88aa824a7e6caa99c03d2650c790797d649e4b9caa30679729190033da90ec5088a8fc5fe2ba529e72bac706975ce3aafef6cb5bcf6d7826ba328b973e052aacebc3a5b39a41c7c6fbcc4ceda2e13d") ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="38ae8bdfe72648fa2146e408deaa675ab3cbd045067b83dd891f5484f9a9b0e37a0204ca9b9ad46131d75aeeefea19103b62d2007448d23d76e73f5e9bd5deb11ab40d2bf7f7ff0d4eb770f43a676ec47268b049edd95aa8a240a224379c39cc5769d94b34097e5e42b5f8bc1d88e8c6878bcc1c4482733b95960ccf9510ed457b030efb84f370391942bc05a4f91648e844cfd42ad597e2d4d809a55408c1c6"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) setsockopt$inet6_dccp_int(r1, 0x21, 0xf, &(0x7f0000000640)=0x8, 0x4) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000180)) 00:52:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:14 executing program 2 (fault-call:2 fault-nth:4): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) 00:52:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x281400, @loopback={0x0, 0x1}}, 0x1c) [ 810.108920] XFS (loop5): log mount failed [ 810.177553] hfs: unable to parse mount options 00:52:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:14 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40000, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f00000000c0)="07292d93141e696f8c0c1061527bee56ccea0c024c8fb17e847d004164929ed6fc408c38859f5e881394d786cf5310abc43f83445c3c5338b2482c6e1dcc3bbbda89064ee86eb4b5de35efe0a70f3c5062334244114f7f0905a9ea6a4fdbf37619d4273f483f87ba6138cf77d6e21a7eaa22bc93467768af81d6d2053f6fd2", &(0x7f0000000200)=""/237}, 0x18) 00:52:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x284) [ 810.199698] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 810.221781] hfs: unable to parse mount options [ 810.361141] XFS (loop5): Mounting V4 Filesystem [ 810.383666] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 810.392206] XFS (loop5): Log size out of supported range. [ 810.397874] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 810.420759] XFS (loop5): Invalid block length (0x1) for buffer [ 810.426901] XFS (loop5): empty log check failed [ 810.431653] XFS (loop5): log mount/recovery failed: error -12 [ 810.441460] XFS (loop5): log mount failed [ 810.489110] XFS (loop5): Mounting V4 Filesystem [ 810.500593] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 810.509260] XFS (loop5): Log size out of supported range. [ 810.514875] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 810.532590] XFS (loop5): Invalid block length (0x1) for buffer [ 810.538866] XFS (loop5): empty log check failed [ 810.543619] XFS (loop5): log mount/recovery failed: error -12 [ 810.553396] XFS (loop5): log mount failed 00:52:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x4, 0x284) 00:52:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="0000000000007d4aaa96f40c2701000000000000000000"]) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000080)=0x1994) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x0, 0x8001, 0x6, 0x9, 0x9}) 00:52:14 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) 00:52:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xd3, @loopback={0x0, 0x1}}, 0x1c) 00:52:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x800000000001, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0x5, 0x6, &(0x7f0000000800)=[{&(0x7f00000002c0)="42155ad2a64ecbc6a43b83e7916c5f3c041373bf83c08d7d0468bb9e390c504cb6bb72be94edd747aba7d70b0aab16f9e7e271bd84e7a0897124611a0b08ec362509694f458e45f84f25d7a0c53e962f6386eff2257e9464ff3a69d7608e866ca32099ee612c4a3b0cc1eb989939ef2e8aaede70b948cdd3cb39da1e37822278ee9b079b33fbf8faa7ff0f94a4aacd9cd53c173b6ae3543ba9c929ca7cdaca356475d46f77095822c75364dc6c53c88edfb27cd78f060e1a79dcdb874a15e6864409f7f0e97463", 0xc7, 0x9}, {&(0x7f00000003c0)="fc5557a2edf77cbcfea6fe6a6f4274a905d1a68471e1823069eafd95ef765c41d3901443f958d11ee6e2b41a383916626365b346887c6e1664375f3e7296394190b8babed0e7c947921e09a4f2c641a5da4f2517fc3ccd2ad98c267bb4a057d0a2f9aaeb74feab0929afad1d4dd1fb9160e1883485b1106092c813d51ef606cbb52297341aebf23d4fb0b72b8790be1090fac53ae3886fbc215184514cb1723bd22dae", 0xa3}, {&(0x7f0000000480)="625a9339f475790b4b854975ff6f71ddd0e13edada3c99157af42450782ad1a14980305f57bfc291f00b4d7d747270041a2dbec316c93ae494f79fb02ae3a75ab0b9535b4d9d0d58433b81aa1f647f5f016e7c73207c95e7c3078aea49195b467d169740a3e2eaf6964cb1a60964b8b1de525f2d7e3c8f45325b8632e0a654a8e12adbd16cf2defe0b78944dc570bcc92cf0c7ac9ce40fb93c3634f5dc378021d414a02e6c7e9e3a051f7ff507c303269dbeace26b6c746ddea7e767172e51303c26f6a5895bae23bf018ec94685de004e2ac1600625a6a6", 0xd8, 0x1}, {&(0x7f0000000580)="35191082002eb16e7c65ac8fed92410916", 0x11, 0x3}, {&(0x7f00000005c0)="6fccffd8ada20c30499e55ec0debeb7e8c1fe46aa3baa0bf5500f98039669ee40a6e60eebc42ce5c9ff8e2", 0x2b, 0x8}, {&(0x7f0000000600)="72bf1ee44469dfbe2221c62021f69eedee2518dffe72fc08d7703e83041e529d35de042ee501dd751eb31b9b51ec953ccc980722ac3bf3ec374b99db8db4f543f58382cba2bde5411302458caa3bea717fbf32ae871b8a5da0627a071ddb074972f4bb07cafd3b39c91cfb450648243580beb187502454d38b36a5077711c1826a54c333271e69402810d9911b432ac2d64127fd9b3bf4adc16d95e03355e83d12f9debf2a18d1022be61fb38338791a6ff21d17d3acaf283af838884023c36cd8ec2ed6f89aa5", 0xc7, 0x1}], 0x0, &(0x7f0000000700)={[{@jqfmt_vfsold='jqfmt=vfsold', 0x2c}]}) ioctl(r0, 0x5, &(0x7f0000000180)="729f27c457ea388e57218e264dd24d5cdc3f1c1cfb9a978eb5280ffd160500bc0516f202068948ddf6d6a94fd9314fc31b17c35336116539088dafde84f49a4c4d601a5e9229dcbb6b9d018df100f67130ba8fb55cce2e47d47951e6f5a09899327f013c") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000008c0)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x6, &(0x7f0000000080)=[{0x8, 0x9, 0x4, 0xfffffffffffffff9}, {0x1000, 0x7ff, 0x4, 0x6}, {0x1ff, 0x7f, 0xffffffff, 0x3ff}, {0x4, 0x8, 0x8001, 0x4}, {0x5, 0x1, 0x800, 0x5}, {0x1, 0x5, 0x9, 0x5}]}) 00:52:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 810.696298] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 810.757818] XFS (loop5): Mounting V4 Filesystem [ 810.772913] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 810.781410] XFS (loop5): Log size out of supported range. [ 810.787062] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 810.817689] XFS (loop5): Invalid block length (0x1) for buffer [ 810.823916] XFS (loop5): empty log check failed [ 810.828683] XFS (loop5): log mount/recovery failed: error -12 [ 810.835895] XFS (loop5): log mount failed [ 810.900691] XFS (loop5): Mounting V4 Filesystem [ 810.910689] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 810.919187] XFS (loop5): Log size out of supported range. [ 810.924838] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 810.941811] XFS (loop5): Invalid block length (0x1) for buffer [ 810.947976] XFS (loop5): empty log check failed [ 810.952875] XFS (loop5): log mount/recovery failed: error -12 [ 810.960251] XFS (loop5): log mount failed 00:52:15 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x409, 0x284) 00:52:15 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) memfd_create(&(0x7f0000000040)='vmnet0procposix_acl_accessvmnet1system\'($\x00', 0x2) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) prctl$void(0x3f) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x91ffffff00000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:15 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x800448d2, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR, @ANYRES64=r0, @ANYRES32=0x0, @ANYPTR, @ANYPTR]], @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="254ecd00000000000006002e64638a8f9ff7f99d5b65be52f958f9c1aeb109ace8209071367e9cf47cb0cc554a0e9d780516d90200000000000000520d485db2529f1a9cf70d9db4e40b0fc86a21aa7864ac1841dbaf"], @ANYBLOB="000000000000000000e0ff0000000000"]) 00:52:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:15 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x2) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 811.247669] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x10, 0x284) 00:52:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:15 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x200400) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x2, 0xae, &(0x7f0000000000)="e2dc10d2c79a12c50a4477ead2f81c118e26ed704ea414f84024dc6bc89f908d9018a20aeb6c51fb855f27abd29c3ec9cc46c8eaf34a26f548483d42e12cf455081a3f36e2a1c962ae7b7a9bdfd2a80ac480d9411856ca0f89b7c1c163edd11945a81adc72709bf1cf976624cb722347f2f65004b9a6fb9e9d2796beb87905d7ba1ca75d02d625c2e7a917bfbefa5e5b0528e64549cc06d6c8845feaa3cacb46c54dd44f53ea5236c672902437ce"}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x800448d2, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="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"]) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0xc) [ 811.319447] XFS (loop5): Mounting V4 Filesystem [ 811.324883] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 811.333361] XFS (loop5): Log size out of supported range. [ 811.338967] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:15 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x480200) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 811.415746] XFS (loop5): Invalid block length (0x1) for buffer [ 811.421943] XFS (loop5): empty log check failed [ 811.426704] XFS (loop5): log mount/recovery failed: error -12 00:52:15 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000011c0)={0xffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000001240)={0x9, 0x108, 0xfa00, {r2, 0x14, "3810f1", "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"}}, 0x110) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x4010000000000, &(0x7f0000001180)=0x4) getpeername(r0, &(0x7f0000001040)=@hci={0x0, 0x0}, &(0x7f00000010c0)=0x80) recvfrom$packet(r1, &(0x7f0000000040)=""/4096, 0x1000, 0x0, &(0x7f0000001100)={0x11, 0x5, r3, 0x1, 0x4, 0x6}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000001140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="000000fc798c1cf56c5c959903eab98dd3", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 811.468760] XFS (loop5): log mount failed 00:52:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 811.561444] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 811.605552] XFS (loop5): Mounting V4 Filesystem [ 811.627013] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 811.635550] XFS (loop5): Log size out of supported range. [ 811.641161] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x80, 0x101001) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000800)={'nat\x00', 0x1000, "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"}, &(0x7f00000001c0)=0x1024) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) shutdown(r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r2 = socket$inet6(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x101000, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x7, 0x284) [ 811.716412] XFS (loop5): AIL initialisation failed: error -12 [ 811.728401] XFS (loop5): log mount failed 00:52:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x101200) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000100)=""/142) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xc52, 0x200) listen(r2, 0xffffffffffffffff) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000200)=""/213, &(0x7f0000000300)=0xd5) 00:52:16 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0xfffffffffffffffe, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="000006000000000000000000000000000dfd630506d6f2b6419d"]) 00:52:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x24, 0x284) 00:52:16 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfc00000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:16 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f00000003c0)) recvmsg(r0, &(0x7f0000000380)={&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/107, 0x6b}, {&(0x7f0000000140)=""/48, 0x30}, {&(0x7f0000000180)=""/223, 0xdf}, {&(0x7f0000000280)=""/133, 0x85}], 0x4, 0x0, 0x0, 0x9}, 0x40) [ 812.315318] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x40b, 0x284) 00:52:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 812.391566] XFS (loop5): Mounting V4 Filesystem 00:52:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 812.412901] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 812.421400] XFS (loop5): Log size out of supported range. [ 812.427140] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:16 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0xfffffffffffffffd, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB], @ANYBLOB="1f001f00000000000000000000000000"]) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000040)={"2d3a76a2b504c14b4668226ef61da560ce1ddce8a94b441b8512ade33060905ba8f6957972d27b4f78bf58c6585067bdd9fbc6081a017ccb68b9bd05012c2b55a23a689e3a1f343f743d4e408326a0654dfa6d51ba9c13b9054cdbb4771535637e372ac8b6fd94abd6e26efb9a696aa97d766b1f2dc12ab3232bc61dc50fe69475b9e0b2eab21362c280189f1fb201aa11d43efc77b8286e01e9bcf9fa8e240907e210952372d8d1d4334e8ed81de64eaec7a9627c5e0056301865b358df590f6ecfe9aa2e4a063f227ec3fd3486a744f410dcb62a823356a5a3f922e5b2a4a153c12307ab99fc8a71a8f4a250685b0384598a6dcafdec720a817ab390b9f9c7ce796b80c8e580a79e341e979b57371c4f41602f51076021c41886070664bdc4b0b001571af63d9553a2fc04d79beaf80e0f93aeac9d34d2aea14bea16633f98c2fd2a3af33d810a7d30bae567dafe5fa25eab24937f8ed4dd8349c81a18aef8f4625465ab83eb5ff4585904767d6bba4edb41787848bb94532ec8997467c90d9f44d59b9465584eaf9e863f161d9bc4fec13504d05c79cf80e09e826e39b8887fb62a6ac5e430f9ceb59e42a468dd26196e149c99825522d5ee6476544c11d1341458d27551575051054ed60e3c8b530454a99f4405f091eb6508dcfcf4e34586d0b4a6240bb18ee851b876dbd5158c4e7f6bed01c7c406f859947347ba005f6ec1aba526277ffc54373e43c08d1dffcea56c22c26608ed3c70a064b22a96929fe62fc8015524cc0bf5ac65508ca47728a8acc245bcdf22b622250b253d2abb52b7c7348185c335c636609634e0750584e4c9b6b1b485c580da0f7bccc5122b991901602954cad53dfff140e6c0797c15d14bfdb1ef9e7072a23b896506d813b1e355b44af3983453abf520eadc25a208654def9c1031c1076ca3876b42733eff67607023059cee0ccf2021a90f9e0683ed07e406d99d3545aa691658d9cb5c5e4337ca992d2d2c0544eaffdfbff68e489f338593a0057a7b172313e6f5d1010de50693525867b3110305288efd9ff51ac5cd2c5e4c7ab278a54bb30500df1d6f5e158f5fd998983a46e86c912d08af2717232703277db014baea9722199d8bceb84f9a6cc8a52a6c006ed5ea596e8aa37c9c5a4b35abc96f04179118f42ef7384caf575c414651caabc476748141ae14dc2491316ef8ceb640e9f04f2da8437fef65929b315b24f99f71aad304e1616dfa4852688a768eeec307f8a4a384292c172966f4ee85f2126ea612254ffee623449102517fc547d59e950c842a75e7a033a0402c1e1baff1c2520b626aa2169daa8bf3efb2da797155973b3a57089369d753b368f238928d9eafdf93c4941937a0bbaf1355c1805acede5e66a8cc95d31d3ac8ebeceeb41902563a3181b9cfc343ead7f0cb27e893af86736147861f"}) 00:52:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x5, 0x284) [ 812.491481] XFS (loop5): Invalid block length (0x1) for buffer [ 812.497683] XFS (loop5): empty log check failed [ 812.502447] XFS (loop5): log mount/recovery failed: error -12 00:52:16 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @reserved=0x1}, 0x10) pwrite64(r0, &(0x7f0000000300)="6c76f9cd815801eada48f663181cce31e3353aa195a13f8b897a7ada95dbb2b27963c88c59a4fdafeda617731dd88ac037f77369ea98d4e0e20c86f90c82126b8618034df00763a097f0321486fe388daa083bbdf03d050ee816aa18a6490aa9f2ce2d4e63411252aff1973d597ff4aeb12cb201756051cd7c", 0x79, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x101000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000180)=0x1ff, 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0xf000, 0x4000}) listen(r0, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000380)) r2 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) ioctl(r2, 0xeef3, &(0x7f0000000200)="50f2eda94b41a597bb1bd3512d2eba46c6f6c91a627214499a72ac7550efc239e52069b8843b0a0707edef47bc75d4d02ab50ed5db2f4d4a82fbe7ad521ea887dd52e751308fdfeea6de81df7c948f433a7e1e61787a2878060fe17a1993e0f733d60ea605d2a39a7f16f95e26f330d8a159abbc1cffb91be81297ac01c15d0a0e2f601ad0025813d3903f38884acbfd0247c5133c4043ef33c6e3a332c8f2d83802be38f5eb47648fd278dcffc3ad331db74da343898354df29670daeb469580b60fe5bb8fb4a89a01517afddbe30f0854a0b0fd762550a1a03b629b42a234e079afa09e748dd3c0bf310da9562a6") getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000003c0)={@remote, @loopback, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000440)={r3, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40100, 0x0) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f00000000c0)={0x81, 0x382666d1, 0x100000000, 0x8001}, 0x10) [ 812.569424] XFS (loop5): log mount failed 00:52:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) fstat(r0, &(0x7f0000000180)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:17 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) timerfd_gettime(r1, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'dummy0\x00'}}) 00:52:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) [ 812.673923] XFS (loop5): Mounting V4 Filesystem [ 812.682375] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 812.690880] XFS (loop5): Log size out of supported range. [ 812.696626] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x25, 0x284) [ 812.729353] XFS (loop5): Invalid block length (0x1) for buffer [ 812.735617] XFS (loop5): empty log check failed [ 812.740381] XFS (loop5): log mount/recovery failed: error -12 [ 812.793929] XFS (loop5): log mount failed 00:52:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 812.998624] XFS (loop5): Mounting V4 Filesystem [ 813.004966] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 813.013458] XFS (loop5): Log size out of supported range. [ 813.019096] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 813.035166] XFS (loop5): Invalid block length (0x1) for buffer [ 813.041327] XFS (loop5): empty log check failed [ 813.046076] XFS (loop5): log mount/recovery failed: error -12 [ 813.052541] XFS (loop5): log mount failed [ 813.076238] XFS (loop5): Mounting V4 Filesystem [ 813.081637] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 813.090131] XFS (loop5): Log size out of supported range. [ 813.095738] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 813.107903] XFS (loop5): Invalid block length (0x1) for buffer [ 813.113989] XFS (loop5): empty log check failed [ 813.118746] XFS (loop5): log mount/recovery failed: error -12 [ 813.125328] XFS (loop5): log mount failed 00:52:17 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:17 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="f484a97e6c2d76e8ec1127f8a41f98949a0323d5699680489dc249a88c5681849a295884491badd2d9da6e22d4103c14387acb4f4f0a519dea79138814b48b7d3635c9ecf930f9cc69e951f4b2e39c89013e1ed075963c2f9e0b"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$KDDELIO(r1, 0x4b35, 0x4) 00:52:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @reserved=0x1}, 0x10, 0x0) 00:52:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x40a, 0x284) 00:52:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x7000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') [ 813.379422] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:17 executing program 6: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x4) listen(r0, 0x0) accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, 0x0) 00:52:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0xa, 0x284) [ 813.457802] XFS (loop5): Mounting V4 Filesystem [ 813.479756] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 813.488380] XFS (loop5): Log size out of supported range. [ 813.494008] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 813.551475] XFS (loop5): Invalid block length (0x1) for buffer [ 813.557728] XFS (loop5): empty log check failed [ 813.562480] XFS (loop5): log mount/recovery failed: error -12 [ 813.590943] XFS (loop5): log mount failed 00:52:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x100, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, [0x2, 0x5, 0x9, 0x5, 0x0, 0x8ace, 0xfffffffffffffff9, 0x4, 0x4, 0x7, 0x3, 0x5, 0x1, 0x4, 0x2]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x9}, 0x8) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x4) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x2, 0x284) 00:52:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/30, 0x1e}, {&(0x7f0000000080)=""/180, 0xb4}, {&(0x7f0000000140)=""/4, 0x4}], 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f00000001c0)={{0x40, 0x9}, {0x8, 0x2}, 0xfff, 0x2, 0x1}) 00:52:18 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = semget(0x3, 0x0, 0x80) semop(r0, &(0x7f0000000080)=[{0x3, 0x6, 0x1800}, {0x7, 0x3f, 0x1800}, {0x3, 0x5170dfa8, 0x1800}, {0x2, 0x4}, {0x3, 0x7fffffff, 0x1000}, {0x1, 0x7, 0x1800}, {0x3, 0x3f, 0x1800}, {0x2, 0x5, 0x1000}, {0x4, 0x6, 0x1800}], 0x2aaaaac4) 00:52:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 813.645904] XFS (loop5): Mounting V4 Filesystem [ 813.652625] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 813.661240] XFS (loop5): Log size out of supported range. [ 813.666856] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 813.713219] XFS (loop5): Invalid block length (0x1) for buffer [ 813.719389] XFS (loop5): empty log check failed [ 813.724132] XFS (loop5): log mount/recovery failed: error -12 00:52:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) [ 813.775334] XFS (loop5): log mount failed 00:52:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x26, 0x284) 00:52:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfc, @loopback={0x0, 0x1}}, 0x1c) 00:52:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = gettid() sched_setattr(r1, &(0x7f0000000480)={0x30, 0x7, 0x1, 0x0, 0x500000, 0xda6, 0x9, 0xfff}, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)='em1wlan1\\ppp0\x00', 0xfffffffffffffffa) keyctl$read(0xb, r3, &(0x7f00000001c0)=""/115, 0x73) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d2, &(0x7f0000000000)) fadvise64(r0, 0x0, 0xffffffffffffff3e, 0x7) accept4$unix(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000340)={0xffffffffffffffc1, 0x4, 0x20d, 0xffffffffffffff00, 0x4, 0xec, 0xcf2, 0x0, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000400)={r4, 0x38, &(0x7f00000003c0)=[@in6={0xa, 0x4e22, 0x1, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x1}, @in6={0xa, 0x4e23, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x4}]}, &(0x7f0000000440)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x1, {0xa, 0x4e24, 0x4, @ipv4={[], [0xff, 0xff]}, 0x7f}, r5}}, 0x38) 00:52:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:18 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "717565756531000000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 814.440653] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = msgget$private(0x0, 0x8) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) ioctl$KDADDIO(r1, 0x4b34, 0x994) 00:52:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x6, 0x284) 00:52:18 executing program 6: r0 = socket$inet6(0xa, 0x800000001, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = memfd_create(&(0x7f0000000ffe)='$\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40400, 0x0) quotactl(0x2080000201, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000040)) [ 814.510159] XFS (loop5): Mounting V4 Filesystem [ 814.520575] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 814.529122] XFS (loop5): Log size out of supported range. [ 814.534816] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 814.610773] XFS (loop5): Invalid block length (0x1) for buffer [ 814.616988] XFS (loop5): empty log check failed [ 814.621746] XFS (loop5): log mount/recovery failed: error -12 [ 814.657571] XFS (loop5): log mount failed 00:52:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) socketpair(0x3, 0x80f, 0x8001, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000180)={{0x2, 0x4e21}, {0x307, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, {0x2, 0x4e22, @broadcast=0xffffffff}, 'veth1_to_bridge\x00'}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:19 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x1f, &(0x7f0000000080)=0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:52:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0xf, 0x284) 00:52:19 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x40) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x4}, 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0xc0189436, &(0x7f0000000080)={{0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, [0xfe]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @loopback=0x7f000001}}) [ 814.750916] XFS (loop5): Mounting V4 Filesystem [ 814.762163] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 814.770628] XFS (loop5): Log size out of supported range. [ 814.776267] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:19 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x100, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, [0x2, 0x5, 0x9, 0x5, 0x0, 0x8ace, 0xfffffffffffffff9, 0x4, 0x4, 0x7, 0x3, 0x5, 0x1, 0x4, 0x2]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x9}, 0x8) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x4) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:19 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 814.847849] XFS (loop5): AIL initialisation failed: error -12 [ 814.858904] XFS (loop5): log mount failed 00:52:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x402, 0x284) 00:52:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530f9", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:19 executing program 1: socket$pppoe(0x18, 0x1, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x100, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000000c0)={0x1, 0x0, 0x46, 0x7ff, 0x10001, 0x10000, 0x2, 0x7fff, 0x4, 0x6}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000001500)) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000040)={0x800, 0x10, [0x9, 0x4, 0x22, 0x0]}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000011c0)=0x5) recvfrom$inet(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x1, &(0x7f0000001140)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000001300)="5b665c9ea450921a51cd3de722fb0a6b16c0950b0e64860311e6625ea7e8d06f8ecc449f118e2c2d0a6dce836f7d58678c2286e24c5e70cfacd9ccdd2c9a4c38ef86c31b5b96a0affdf61f3f89b26ebc322daadcbc7170654f3a32a06f6744cd99cadc97bd1e2d59cf570dcef00af11230e40e70891f0ce9f1c533b32ec28c248d5b9550d61df93f5e78", 0x8a) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000013c0)={0x0, 0xac, "61505129954ec2e02611dc391601d617c6eab9288b9b94bac212f8035ded82e686ba4fa84e9f853d952bf74c98f64cd10704594bfec38ddae0524ae69402cc465cc9a87c9b5354afc87e11f2e2784248834ccbd5afc3668af6379aed5c33cc00f9a215487aac6fb5d0c3b6282464ae1d7df62107ed566f58020c314c4001ca7a3960ef09ba2447c7222d910816d6973f0e9a15370893f262ac5cff93627439a824d90df2ff61a2bdc27e4536"}, &(0x7f0000000100)=0xb4) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000001480)={{0x7, 0x3fa5dae7}, {0x2, 0x2}, 0x3, 0x1}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001180)={r2, 0x800}, 0x8) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001200)=ANY=[@ANYBLOB="b92eecb4c33eb97e000000000000000001000000c59128320c46ada7c2df4be75d83f3bb9c8d65b361ae22979ea4c0d6bc6d83ddaad3937250766fa5c1b6cb4f4c08b54b38c69261ede1b61ea4eb59ef6c9c5ddf88867e573291006950f5a11b7c7ed72e8b9220837d00d166aee9324cbd0379a7dd86ace48dd8b8d7c5746c2daf0716c26dae1441518d5ad2f748f5d21892b8d8f68bb84acd83250ac1993e677cde17c5720c2453b4456d5a6983c320947c89e668a07c998e0fa4d129050208807b7a6ab97c79a6ce1e91ceddfe9c93c32ceed2e134aaaf0668d1d0452fc2e39d1a9134e281711b462e529a6f338c08"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:52:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x407, 0x284) [ 815.148854] XFS (loop5): Mounting V4 Filesystem [ 815.154435] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 815.162868] XFS (loop5): Log size out of supported range. [ 815.168480] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 815.181274] XFS (loop5): Invalid block length (0x1) for buffer [ 815.187323] XFS (loop5): empty log check failed [ 815.192071] XFS (loop5): log mount/recovery failed: error -12 [ 815.198761] XFS (loop5): log mount failed [ 815.236119] XFS (loop5): Mounting V4 Filesystem [ 815.249274] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 815.257750] XFS (loop5): Log size out of supported range. [ 815.263551] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 815.277187] XFS (loop5): Invalid block length (0x1) for buffer [ 815.283292] XFS (loop5): empty log check failed [ 815.288058] XFS (loop5): log mount/recovery failed: error -12 [ 815.295398] XFS (loop5): log mount failed 00:52:19 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000000000001f00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x3, 0x284) [ 815.497345] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x29, &(0x7f00000000c0)=0x40000000000003, 0x4) sendto$inet6(r2, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f0000000080)=""/59, &(0x7f0000000180)=0x3b) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) r4 = dup3(r0, r2, 0x80000) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000040)={0xfffffffffffff60f, 0x3, 0x2ab26382, 0x2, 0x9, 0x400}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) 00:52:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x8, 0x284) [ 815.884951] XFS (loop5): Mounting V4 Filesystem [ 815.891228] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 815.899677] XFS (loop5): Log size out of supported range. [ 815.905331] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 815.917357] XFS (loop5): Invalid block length (0x1) for buffer [ 815.923423] XFS (loop5): empty log check failed [ 815.928133] XFS (loop5): log mount/recovery failed: error -12 00:52:20 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x100, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, [0x2, 0x5, 0x9, 0x5, 0x0, 0x8ace, 0xfffffffffffffff9, 0x4, 0x4, 0x7, 0x3, 0x5, 0x1, 0x4, 0x2]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x9}, 0x8) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x4) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x20000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:20 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40801, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=@routing={0x0, 0x2, 0x1, 0x8, 0x0, [@empty]}, 0x18) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="889b1adc8366622866ba722114330124476ae64ec085f753eb59b84278594e66b56db5443418701ac5fdc71aa02d4e31ce73c069af64f947fcf4e0f6ba118c6fc85dbed089d502fc2db26755dbc9321f4921571fe61f77b0545c2ce0ffdd1e903c9905123828719e20c533"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r3 = fcntl$getown(r2, 0x9) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r4, 0x508, 0x70bd2c, 0x25dfdbfd, {0x3}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x81}, 0x20008800) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x280, 0x0) ptrace$setregset(0x4205, r3, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)="97d316614a676872f0555cd76b459c639b9dd03ed1d72b17c701e9b24528436b9200b8ed29ae1046e5e116ba3a5662a971a2c9a6233c58bda5085ae357db5daa97ef6d0375351fbe94b0e8fa05f4a6e54a02f3ead0dea6f52520481ee4a1d4d7bb705534554a670cd6e6822ee2b3ec5ea60165442e841b65f71bb2898362b04c1086a1f5eb735b7cd65f1e297586f4e78b851875e5a229e13a9cc5929b6f270d5f8286843f543f1d6056d88093583db010", 0xb1}) syz_open_procfs(r3, &(0x7f0000000240)='net/sco\x00') 00:52:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x11, 0x284) [ 815.937770] XFS (loop5): log mount failed 00:52:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x408, 0x284) [ 815.994277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.082309] XFS (loop5): Mounting V4 Filesystem [ 816.098376] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 816.107070] XFS (loop5): Log size out of supported range. [ 816.112710] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 816.161802] XFS (loop5): AIL initialisation failed: error -12 [ 816.177610] XFS (loop5): log mount failed 00:52:20 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000100"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000010000000000000000000000"]) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) 00:52:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:20 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x9, 0x284) 00:52:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000180)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x4, 0x9, 0x1000000}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x2000, @loopback={0x0, 0x1}}, 0x1c) 00:52:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8040, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000000c0)={0x55, 0x8, 0x4, {0x9, 0x9}, {0xffffffff, 0x8}, @cond=[{0x7ff, 0x1, 0x8000, 0x4e6ec703}, {0x5, 0xffff, 0x106, 0x7fffffff, 0x6bc, 0x1c}]}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d2, &(0x7f0000000000)) 00:52:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0xb, 0x284) [ 816.770739] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.862597] XFS (loop5): Mounting V4 Filesystem [ 816.880136] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 816.888734] XFS (loop5): Log size out of supported range. [ 816.894373] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:21 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x100, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, [0x2, 0x5, 0x9, 0x5, 0x0, 0x8ace, 0xfffffffffffffff9, 0x4, 0x4, 0x7, 0x3, 0x5, 0x1, 0x4, 0x2]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x9}, 0x8) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x4) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5dc], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}) flock(r1, 0xb) 00:52:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x40e, 0x284) [ 816.973096] XFS (loop5): Invalid block length (0x1) for buffer [ 816.979289] XFS (loop5): empty log check failed [ 816.984062] XFS (loop5): log mount/recovery failed: error -12 [ 816.994606] XFS (loop5): log mount failed 00:52:21 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000000c0)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) fcntl$dupfd(r1, 0xfffffffc, r1) [ 817.108998] XFS (loop5): Mounting V4 Filesystem 00:52:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xd2, @loopback={0x0, 0x1}}, 0x1c) 00:52:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x100000) [ 817.155696] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 817.164211] XFS (loop5): Log size out of supported range. [ 817.169846] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 817.201801] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.244580] XFS (loop5): AIL initialisation failed: error -12 [ 817.257533] XFS (loop5): log mount failed 00:52:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="8fa056e0ace0ebbce18039084d3b0dad892a31a44ad64f0699debf4b06e0c700ac3fa79fbf81ae7dbedc5f61039efb", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="31da065ca239c59c014c596b379db9cb6fad7d77c443fb3d1cfaa3fce367d66995590fb8b04474a707451bb2328abf5fb996ebaa4aecdc33fa620cbcf4c513a844215313bbf2f4d3da749038ea7331fabbe5d1fc26e64a652439d6a289d48ccd7b9024851ed0e56109b220"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:52:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530e6", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:21 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x1) fcntl$notify(r0, 0x406, 0x15) [ 817.593124] XFS (loop5): Mounting V4 Filesystem [ 817.598708] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 817.607185] XFS (loop5): Log size out of supported range. [ 817.612787] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 817.629984] XFS (loop5): Invalid block length (0x1) for buffer [ 817.636113] XFS (loop5): empty log check failed [ 817.640854] XFS (loop5): log mount/recovery failed: error -12 [ 817.647616] XFS (loop5): log mount failed [ 817.673673] XFS (loop5): Mounting V4 Filesystem [ 817.679303] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 817.687709] XFS (loop5): Log size out of supported range. 00:52:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x4) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x800, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000200)={r2, 0x1, 0x6, @random="2a66cba89a9e"}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") recvfrom(r3, &(0x7f0000000240)=""/3, 0x3, 0x40000001, &(0x7f00000002c0)=@xdp={0x2c, 0x3, r2, 0x3}, 0x80) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:22 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000bf00"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:22 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="00020000000000000000"], @ANYBLOB="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"]) 00:52:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1000000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 817.693333] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 817.705347] XFS (loop5): Invalid block length (0x1) for buffer [ 817.711433] XFS (loop5): empty log check failed [ 817.716166] XFS (loop5): log mount/recovery failed: error -12 [ 817.722729] XFS (loop5): log mount failed [ 817.780960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:22 executing program 6: r0 = socket(0x11, 0x80002, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) getpeername(r0, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) 00:52:22 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x8) fcntl$notify(r0, 0x406, 0x284) 00:52:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c65301d", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:22 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="d529bd7081f20afd0489c0cf894c324d7240a157ae83396bfb4169340ff5baec18ec3c09f29ce0da86"], @ANYBLOB="00000000000800001700000000000000"]) 00:52:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xca00000000000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 818.175012] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:22 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = getpid() r2 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_generic(r0, &(0x7f00000037c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000003780)={&(0x7f0000000300)={0x3450, 0x3d, 0x400, 0x70bd2a, 0x25dfdbff, {0x1b}, [@generic="6cc5b985e48f2e6908056570fce8ab74d94a5d73c3b54baefe174eebfcd03a7a2ca46d367adfab2c46a422228924a02a546cbb993e58eb15e8e62ef4779c6d097ea64c4ece927e8866296671", @nested={0x1128, 0x4, [@typed={0x8, 0x6, @ipv4}, @typed={0xc, 0xe, @u64=0x3f}, @generic="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", @typed={0x8, 0x6e, @u32=0x401}, @typed={0x8, 0x1, @pid=r1}, @typed={0x8, 0x5f, @ipv4=@multicast1=0xe0000001}, @generic="fbd23e3e35dba34faf2ea615a600213e1eee06d4db695b3961b1b6d96320114c9117539e3bde4ed729b5b1340d47e07d2c280fab486ab15cd8db6a0101801ec5d76b8c3a80f0a3055eb8d099d3b09c412172742f9d8323d406bc102833db6c6ac1d1bd8a8b58d1ebfea41edac2fe64a2b9cab8bbf4c6b5cb84edbe2b8109c0f0246e1b2dc04961a46867feab6bd58e1029b68f2207f67b4cf1014d169afd44038205a42f3bab997c5edcc68b66e7f746266af7a74a05b2a2d4140102876c9198c2e28575b71c98973d41b0c5e6d6171022607441fafc5d62ccab712d91ec0e563981d21d4fa3e011f5481bf43b151461bd245cf0002a3719"]}, @nested={0x130, 0x87, [@generic="168e8a8d2f01a650f5afdcb0e45f849b33b1ea0be4727f5afb9232ebf9308feb2d60661383cf1137697e067020c8742a79463f3911c7a636c7a57838f42aa5f86639a76ae2e9712860e230584d63fe9ac6c0a44a64a6644e5695329dd01b06a6536c12f26de060345748565524d8b0f5f5584863e295f1cb97143548b73ff26141a9be3f8afbf00478d2fbc70f8c2cede7e81a853369390b5133d54303a19a34ced6275b9dc6eb9916503b7eae3880263f8abcd491e1af7dd7549a6c1e1644b7e6e18b5ba6221bd5cf07", @typed={0x8, 0x3e, @pid=r2}, @typed={0x4, 0x7c}, @generic="4a193c9f2be0ddcbeb946b6a1d8bf6dc82f7c1dfc7f3bcb6c8e2aaa797778d9bdf2e1134f7563268433f5803ab7a1ec1277a753d6f8f8ddc61ca5866c783208aa125", @generic="19c551edc6a19034ebbfc22f3dbd7938", @typed={0x4, 0x64}]}, @nested={0x1010, 0x80, [@typed={0x1004, 0x54, @binary="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"}, @typed={0x8, 0x58, @uid=r3}]}, @generic="413729f2810c4f6362afc5481f", @typed={0x14, 0x30, @str='/dev/snapshot\x00'}, @nested={0x1084, 0x50, [@generic="fd4d42590f4df84690fc91627fe037517c0aa50fae4757a96cfe97d96f1478654682190111ee334c87aa3b0042c10e73540e3da8e6aca3f1d90a726b729cece6fed84110626ff1dcd0a4d6340c4ea489a1eee9497c5866979878fd58726086214452fc843a53beaf42865dfc1971f20f4f0010c176325306", @generic="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", @typed={0x8, 0x1a, @uid=r4}]}, @generic="a8602a4626ad6047baf5c883104271d467e87909a997a966f74c228c0e5e0bd338b23719b74e87d7cb6c99d34ed9c547db6985722a9c3822a8337f52ad5a857a8e3d6bc83a545625f2c21189a5a1cae4a68366b66bc228437832f64ed65dfd37fbc2707adc876838455653010823a917637646e6d27fc8dc9dab42dc3ff0e4aabf64b627084253ae260e70e727a72b1c46291b7c3839a027f35ea39a04100231c227a5365d3c17b3fdb2edb690adbf2812991a78", @generic="00dd1c2e433d16701b87df85fc40ac455b766240e68c0bd40c600d2dd2b43f08e57d8464d7f1002ca3a9f042c3"]}, 0x3450}, 0x1, 0x0, 0x0, 0x800}, 0x880) r5 = epoll_create(0x1) fcntl$notify(r5, 0x406, 0x284) 00:52:22 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2f76dfc73c9693808d6e005206327e2f", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x5) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000140)=0x200000000) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000080)) readv(r2, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/172, 0xac}], 0x1) ioctl$VHOST_NET_SET_BACKEND(r2, 0xaf02, &(0x7f0000f1dff8)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r1}) connect$unix(r1, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) [ 818.256165] XFS (loop5): Mounting V4 Filesystem 00:52:22 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x8) fcntl$notify(r0, 0x406, 0x284) [ 818.290360] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 818.298836] XFS (loop5): Log size out of supported range. [ 818.305457] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 818.393260] XFS (loop5): Invalid block length (0x1) for buffer [ 818.399501] XFS (loop5): empty log check failed [ 818.404286] XFS (loop5): log mount/recovery failed: error -12 [ 818.412499] XFS (loop5): log mount failed [ 818.489845] XFS (loop5): Mounting V4 Filesystem [ 818.510987] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 818.519431] XFS (loop5): Log size out of supported range. [ 818.525073] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 818.553546] XFS (loop5): Invalid block length (0x1) for buffer [ 818.559692] XFS (loop5): empty log check failed [ 818.564500] XFS (loop5): log mount/recovery failed: error -12 [ 818.589550] XFS (loop5): log mount failed 00:52:23 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = epoll_create(0x1) fcntl$notify(r1, 0x406, 0x284) syncfs(r0) 00:52:23 executing program 6: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x310, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x278, 0xffffffff, 0xffffffff, 0x278, 0xffffffff, 0x3, &(0x7f0000000180), {[{{@ip={@multicast2=0xe0000002, @multicast2=0xe0000002, 0xff000000, 0xff000000, 'syzkaller1\x00', 'bond0\x00', {}, {0xff}, 0x0, 0x3, 0x24}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xaaa, [0x1600, 0xffff, 0x6, 0x1, 0x400, 0x3ff], 0x6, 0x7, 0x5}, {0x3, [0xfff, 0x8, 0x80, 0xd0, 0x6, 0x8a04], 0x800, 0x5, 0x20}}}}, {{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x48, 0x400, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x4, 0x4, 0x80000000, 'snmp\x00', 'syz0\x00', 0xfffffffffffffff9}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x370) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f00000003c0)='gfs2meta\x00', 0x1003, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) 00:52:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x3, 0x9) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xca000000, @loopback={0x0, 0x1}}, 0x1c) 00:52:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530f2", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:23 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) [ 818.835543] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:52:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:23 executing program 2: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@hci={0x0, 0x0}, &(0x7f0000000040)=0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, r2}, 0x14) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r4 = epoll_create(0x1) syncfs(r1) fcntl$notify(r4, 0x406, 0x284) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000180)=0x0) fcntl$lock(r4, 0x5, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x0, r5}) [ 818.912128] XFS (loop5): Mounting V4 Filesystem [ 818.925824] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 818.934473] XFS (loop5): Log size out of supported range. [ 818.940096] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 819.023263] XFS (loop5): Invalid block length (0x1) for buffer [ 819.029415] XFS (loop5): empty log check failed [ 819.034181] XFS (loop5): log mount/recovery failed: error -12 [ 819.060598] XFS (loop5): log mount failed 00:52:23 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = epoll_create(0x3fe) fcntl$notify(r0, 0x406, 0x284) 00:52:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:23 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = socket$inet6(0xa, 0x805, 0xfff) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080)=0x8, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x1f}, 0x3}, {0xa, 0x4e22, 0x0, @empty, 0x5}, 0x100, [0x7d161ad8, 0x0, 0x7, 0x40, 0x9, 0x55, 0x773, 0x3ff]}, 0x5c) fadvise64(r0, 0x21, 0x6, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x2000, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, "5fccbb392ec3e0b4cfd61197026442e79a88b4990f02197dc21e72d1f27c84d0e3328d9ed0ad0e8837bd94a6232e1343f2dc6d9d62b6e2aeded5cb96a1791d76d1b8f6fe556be1acf7a8aa6567ae"}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'bcsh0\x00', 0x400}) [ 819.159634] XFS (loop5): Mounting V4 Filesystem [ 819.175697] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 819.184158] XFS (loop5): Log size out of supported range. [ 819.189770] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 00:52:23 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = epoll_create(0x1) read(r1, &(0x7f0000000000)=""/53, 0x35) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) fcntl$notify(r1, 0x406, 0x284) [ 819.229734] XFS (loop5): AIL initialisation failed: error -12 [ 819.258086] XFS (loop5): log mount failed 00:52:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c6530cd", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:23 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x3, 0x4}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x40, 0x4, 0x3, 0x7fffffff, r2}, &(0x7f00000001c0)=0x10) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x1784, 0x6, 0x8, 0x1, 0x7}, 0x14) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x1e2) 00:52:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:30 executing program 6: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000040)='./bus\x00', 0x81, 0x0) sendfile(r1, r0, 0x0, 0xd7c3) lseek(r0, 0x0, 0x4) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) 00:52:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)="2e2f66696c653012", 0xfffffffe, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000000000040000000000000008000000000000000810000000000000082000000010000100000000001000000feffff05c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000140)=@noalign='noalign') 00:52:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:30 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x400) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x12}, 0x1}, @in6={0xa, 0x4e21, 0xc61, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x200}, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x800}, @in6={0xa, 0x4e20, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, @in={0x2, 0x4e24, @multicast1=0xe0000001}], 0x80) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) r2 = epoll_create(0x7) fcntl$notify(r2, 0x406, 0x284) fsetxattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f00000000c0)='vmnet0/vmnet1lotrustedtrusted,\x00', 0x1f, 0x2) 00:52:30 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) poll(&(0x7f0000000040)=[{r0, 0x10}, {r0, 0x10}, {r0, 0x180}, {r1}], 0x4, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x800448d2, &(0x7f0000000700)=ANY=[@ANYRES32=r1, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRES32=r1, @ANYBLOB="43e5c701c4ef250c849dac8497802e242fee199565ced10df7a94fdbbfa7be651f6c442ee1234a3069902c3869ff219e35b3d471a83f7ea940665b768eb8cde84c74312255e34fc71d460272c2c1c91e3f631d04bc1e34ede436f55822d0fefd0b8eadf9692158ecc58a3d0d3195840ea1b771651530c215bb8bc0fada07cc987215711a548e07c0b6f4d4949d6d56eb2208af377d1415c5ee70dddd95da94e1ff66fd6fa2b78d771c0e09c09edb1fc1660b4129575667646d046814668786586851aa5c47d6f3302276448cd89168981692d302f1fbad297d90f2ed1060a2fc0f22fee05ce8bc1f52adb30b08cd528ab4ffe06bee2be9b3dd299aa33b5660", @ANYBLOB="7a0675b2ec7c530f1668794cccd26fe0c2754c8751211740a985cdfe0957a29bfef8f8f3e671e373fa95a4895074f03062682141df8dc462d9a9c12327a6e6464de087fbea1e9920ebf435d99a07f60ec73bce4b4e29f26141de7a04704b2d05dec664bb5d4b0bffef94d404e26ae180e5e0cfd5e105a84763e74d1799fdbe8d98b22fd20299e034715f93b6d7f816dc7bb916660f508526", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR], @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB="d5d2d3af9c2bbfeb6d6480c84eb5723fd83b2537bf48dedd7961edf8", @ANYPTR], @ANYRES32=r1, @ANYRES64=r1], @ANYRES64=r1, @ANYRES64=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:52:30 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x0, 0x0, 0x0, "71756575653100000000000000000400"}) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 00:52:30 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3, @loopback={0x0, 0x1}}, 0x1c) 00:52:30 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @local}, &(0x7f00000001c0)=0xc) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0xa, "555c5b1d481c20532c3b"}, &(0x7f0000000300)=0x12) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000440)={r2, 0xd8, &(0x7f0000000340)=[@in6={0xa, 0x4e21, 0x7a20, @empty, 0xfffffffffffffff9}, @in={0x2, 0x4e21}, @in6={0xa, 0x4e22, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0xffffffff}, @in6={0xa, 0x4e20, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x101}, @in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0xd}, 0x1}, @in6={0xa, 0x4e21, 0x2, @empty, 0x800}, @in6={0xa, 0x4e20, 0x8a8d, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x6}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000480)=0x10) read(r1, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000780)={0x25, @time}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000004c0)={0xff, 0xfffffffffffffe00, 0x5}) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x40bc5311, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) close(r1) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x7fff, 0x4}, 'port1\x00', 0x80, 0x1418, 0x8000, 0x100000000, 0x9, 0x3f, 0xfffffffffffffffe, 0x0, 0x3, 0x8}) [ 826.551856] BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 [ 826.556268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 826.559893] PGD 1974d9067 P4D 1974d9067 PUD 1c9595067 PMD 0 [ 826.559928] Oops: 0010 [#1] SMP KASAN [ 826.559947] CPU: 1 PID: 29710 Comm: syz-executor1 Not tainted 4.18.0-rc2+ #121 [ 826.587280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.596754] RIP: 0010: (null) [ 826.600677] Code: Bad RIP value. [ 826.604072] RSP: 0018:ffff88019811f758 EFLAGS: 00010246 [ 826.609506] RAX: 0000000000000000 RBX: ffff8801d267c000 RCX: ffffc90003e2c000 [ 826.616790] RDX: ffff88019811fab0 RSI: ffff8801d267c000 RDI: ffff8801ab7d9d40 [ 826.624089] RBP: ffff88019811f800 R08: ffff8801a9106600 R09: ffffed003b5e46d6 [ 826.631381] R10: 0000000000000003 R11: 0000000000000000 R12: ffff88019811fab0 [ 826.638669] R13: ffff8801ab7d9d40 R14: ffffffff887b6ac0 R15: ffff8801967361c0 [ 826.645960] FS: 00007fc7926e3700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 826.654202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 826.660092] CR2: ffffffffffffffd6 CR3: 00000001ad09a000 CR4: 00000000001406e0 [ 826.667376] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 826.674654] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 826.681923] Call Trace: [ 826.684521] ? sock_poll+0x2e1/0x490 [ 826.688248] ? kernel_sendpage_locked+0x120/0x120 [ 826.693116] ? kernel_sendpage_locked+0x120/0x120 [ 826.697991] do_sys_poll+0x74d/0x1180 [ 826.701815] ? compat_core_sys_select+0xb10/0xb10 [ 826.706700] ? lock_downgrade+0x8f0/0x8f0 [ 826.710877] ? exit_robust_list+0x290/0x290 [ 826.715210] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 826.719629] ? graph_lock+0x170/0x170 [ 826.723451] ? __alloc_fd+0x34e/0x710 [ 826.727260] ? find_held_lock+0x36/0x1c0 [ 826.731332] ? poll_initwait+0x180/0x180 [ 826.735436] ? pvclock_read_flags+0x160/0x160 [ 826.739944] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 826.744964] ? timespec64_add_safe+0x204/0x2f0 [ 826.749549] ? nsec_to_clock_t+0x30/0x30 [ 826.753702] ? do_gettimeofday+0x180/0x180 [ 826.757945] ? do_fcntl+0x131/0x14f0 [ 826.761660] ? __fget_light+0x2f7/0x440 [ 826.765642] ? poll_select_set_timeout+0x156/0x240 [ 826.770576] ? do_restart_poll+0x2e0/0x2e0 [ 826.774825] ? exit_to_usermode_loop+0x8c/0x370 [ 826.777618] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 826.779503] __x64_sys_poll+0x197/0x530 [ 826.779519] ? __ia32_sys_pselect6+0x270/0x270 [ 826.779537] ? do_syscall_64+0x9a/0x820 00:52:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:31 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc0fe, @loopback={0x0, 0x1}}, 0x1c) [ 826.779550] do_syscall_64+0x1b9/0x820 [ 826.779568] ? finish_task_switch+0x1d3/0x890 [ 826.810739] ? syscall_return_slowpath+0x5e0/0x5e0 [ 826.815689] ? syscall_return_slowpath+0x31d/0x5e0 [ 826.820636] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 826.826017] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.830883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.836078] RIP: 0033:0x455a99 00:52:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 826.839277] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 826.858562] RSP: 002b:00007fc7926e2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 826.866290] RAX: ffffffffffffffda RBX: 00007fc7926e36d4 RCX: 0000000000455a99 [ 826.873572] RDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000020000040 [ 826.880854] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 826.888183] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 826.895463] R13: 00000000004c0639 R14: 00000000004cffa8 R15: 0000000000000000 00:52:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) [ 826.902738] Modules linked in: [ 826.905931] Dumping ftrace buffer: [ 826.909472] (ftrace buffer empty) [ 826.913186] CR2: 0000000000000000 00:52:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0xfffffff5, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0xff, 0xff], @dev={0xac, 0x14}}}}}}}}}, &(0x7f00000016c0)) 00:52:31 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x100000, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x28, @loopback={0x0, 0x1}}, 0x1c) [ 827.048099] ---[ end trace ea6ac01be0d35091 ]--- [ 827.052948] RIP: 0010: (null) [ 827.056881] Code: Bad RIP value. [ 827.060297] RSP: 0018:ffff88019811f758 EFLAGS: 00010246 [ 827.065697] RAX: 0000000000000000 RBX: ffff8801d267c000 RCX: ffffc90003e2c000 [ 827.073000] RDX: ffff88019811fab0 RSI: ffff8801d267c000 RDI: ffff8801ab7d9d40 [ 827.080449] RBP: ffff88019811f800 R08: ffff8801a9106600 R09: ffffed003b5e46d6 [ 827.086621] XFS (loop5): Mounting V4 Filesystem [ 827.087751] R10: 0000000000000003 R11: 0000000000000000 R12: ffff88019811fab0 [ 827.087766] R13: ffff8801ab7d9d40 R14: ffffffff887b6ac0 R15: ffff8801967361c0 [ 827.096947] XFS (loop5): Log size -64064 blocks too large, maximum size is 1048576 blocks [ 827.099731] FS: 00007fc7926e3700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 827.099741] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 827.099749] CR2: ffffffffffffffd6 CR3: 00000001ad09a000 CR4: 00000000001406e0 [ 827.099761] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 827.099768] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 827.099781] Kernel panic - not syncing: Fatal exception [ 827.107096] XFS (loop5): Log size out of supported range. [ 827.115871] Dumping ftrace buffer: [ 827.115877] (ftrace buffer empty) [ 827.115881] Kernel Offset: disabled [ 827.173333] Rebooting in 86400 seconds..