loop0): SB sanity check failed [ 2397.226254] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:38 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000]}}, 0x1c) [ 2397.270488] XFS (loop0): Unmount and run xfs_repair [ 2397.283568] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2397.301615] 00000000: 58 46 53 42 00 00 10 00 00 00 00 e6 00 00 10 00 XFSB............ [ 2397.340067] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2397.351553] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2397.360315] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2397.363871] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2397.377824] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:04:38 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2397.392073] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2397.430443] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2397.442630] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2397.452084] XFS (loop0): SB validate failed with error -117. [ 2397.568031] XFS (loop0): SB sanity check failed [ 2397.573038] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2397.585527] XFS (loop0): Unmount and run xfs_repair [ 2397.597730] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2397.619309] 00000000: 58 46 53 42 00 00 10 00 00 00 00 e6 00 00 10 00 XFSB............ [ 2397.629756] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2397.638286] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2397.647253] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2397.662277] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2397.675031] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2397.683343] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2397.691488] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2397.704538] XFS (loop0): SB validate failed with error -117. 10:04:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) signalfd4(r1, &(0x7f0000000140)={0x8}, 0x8, 0x80800) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x109000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)="73656c66297b776c616e31c676626f786e6574312e766d6e65743000") r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0xbb8230a2d083ea50) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000100)) 10:04:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:39 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x1000000) 10:04:39 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c) 10:04:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100001d000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000feffff0700", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x0, &(0x7f0000001400)=""/123, 0xffffffffffffffb8}, 0x0) [ 2397.858129] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:39 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa078]}}, 0x1c) 10:04:39 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x4000000) 10:04:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2398.018235] XFS (loop0): SB sanity check failed [ 2398.027733] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2398.047882] XFS (loop0): Unmount and run xfs_repair [ 2398.059052] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2398.106994] 00000000: 58 46 53 42 00 00 10 00 01 d0 00 00 00 00 10 00 XFSB............ [ 2398.146275] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2398.163409] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2398.175715] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2398.184229] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2398.193214] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2398.214249] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2398.226773] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2398.238729] XFS (loop0): SB validate failed with error -117. [ 2398.300992] XFS (loop0): SB sanity check failed [ 2398.310437] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2398.322082] XFS (loop0): Unmount and run xfs_repair [ 2398.327698] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2398.335004] 00000000: 58 46 53 42 00 00 10 00 01 d0 00 00 00 00 10 00 XFSB............ [ 2398.343675] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2398.352041] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2398.360680] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2398.369310] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2398.377685] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2398.385923] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2398.394118] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2398.402596] XFS (loop0): SB validate failed with error -117. 10:04:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2000000009}, 0x2a8) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:40 executing program 3: restart_syscall() r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x4000000000000000) 10:04:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000b00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000100)={0x43, 0x9, 0x2, {0x7, 0x80000000, 0x7fffffff, 0xfff, 0x7b5, 0x0, 0x6, 0x2, 0x200}}, 0x43) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f00000014c0)=[@iv={0xc8, 0x117, 0x2, 0xb2, "8ac224071b6c8f038f619f68c8431b06f010f67544738738800ad7d637b9838262ee74c23fef7c8774a3b72a04539ec7b61d9fccea5bb5949a43259c601d459183fdf54434b38cd4067af8028014642b42da38741701aa5bbb430aa7cbec666fdb31af27f6c64bc640e161544c5c1d8a53c60d5093bba8af126f00f9fd2cc79c5e87195c1dbd22cbccc246cb19bd5926a62532b7d9bda53ca68f849b4e343a2ddf47570129e76e692f730e148e66befcbfbc"}], 0xffffffffffffff81}, 0x8015) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) keyctl$set_reqkey_keyring(0xe, 0x5) 10:04:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2398.841614] XFS (loop0): SB sanity check failed [ 2398.846534] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2398.872070] XFS (loop0): Unmount and run xfs_repair [ 2398.882383] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2398.914797] 00000000: 58 46 53 42 00 00 10 00 00 0b 00 00 00 00 10 00 XFSB............ [ 2398.932405] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2398.947404] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2398.968096] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2398.989418] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2399.001162] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:04:40 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) 10:04:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x8000000000) 10:04:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000100)=""/6) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f00000012c0)={&(0x7f00000001c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)=""/119, 0x77}, {&(0x7f00000014c0)=""/89, 0x59}], 0x2, &(0x7f0000001540)=""/66, 0x42, 0x8}, 0x10000) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r2, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(r1, &(0x7f0000000080), &(0x7f0000000100)=0x1c, 0x80000) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x1, @local}, 0x1c) r2 = fcntl$getown(r0, 0x9) syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0xc30, 0x80000) ptrace$getregset(0x4204, r2, 0x4001, &(0x7f0000000240)={&(0x7f0000000140)=""/233, 0xe9}) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2399.013836] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2399.023568] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2399.034072] XFS (loop0): SB validate failed with error -117. 10:04:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x88100) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) 10:04:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in, @in6=@ipv4={[], [], @rand_addr=0x6a}, 0x4e20, 0x0, 0x4e23, 0x0, 0xa, 0x80, 0x80, 0xff, 0x0, r3}, {0x100000001, 0x5, 0x5a, 0x0, 0x7, 0x101, 0x8, 0x9}, {0x80000000, 0x6, 0x400, 0x80000000}, 0x2, 0x6e6bb8, 0x3, 0x1, 0x0, 0x2}, {{@in=@rand_addr=0x2, 0x4d6, 0x3f}, 0xa, @in6=@mcast2, 0x3501, 0x2, 0x0, 0x9, 0x8, 0x101, 0x5}}, 0xe8) 10:04:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000500000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2399.226770] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x1c201) ioctl$TIOCCBRK(r2, 0x5428) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f00000014c0)={0x4, {{0x2, 0x4e22, @multicast1}}, 0x0, 0x5, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e21, @local}}]}, 0x310) 10:04:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xec0f0000000000) 10:04:40 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c) 10:04:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2399.434466] XFS (loop0): SB sanity check failed [ 2399.446019] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)=0x1) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2399.494591] XFS (loop0): Unmount and run xfs_repair [ 2399.506699] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2399.516136] ebt_limit_mt_check: 13 callbacks suppressed [ 2399.516145] ebt_limit: overflow, try lower: 2147483647/65537 [ 2399.541994] 00000000: 58 46 53 42 00 00 10 00 00 05 00 00 00 00 10 00 XFSB............ [ 2399.567147] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:04:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2399.593210] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2399.624760] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:04:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) connect(r1, &(0x7f0000000100)=@llc={0x1a, 0x204, 0x7, 0x1f, 0x1, 0x9, @broadcast}, 0x80) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2399.645290] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2399.658732] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2399.667193] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2399.681787] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2399.688058] ebt_limit: overflow, try lower: 2147483647/65537 10:04:41 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3e8) [ 2399.691416] XFS (loop0): SB validate failed with error -117. 10:04:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="b7f2288a911993f0265df5cf1cdd8b55", 0xfffffffffffffe40) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x64400, 0x0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x8000, 0x2, 0x2, 0xffffffff7fffffff, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)={r3, 0x20}, &(0x7f0000000280)=0x2dc) 10:04:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2399.870972] ebt_limit: overflow, try lower: 2147483647/65537 10:04:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000100)={0xffffffff80000000, {{0xa, 0x4e22, 0x2, @local, 0xa}}}, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r2, 0x80000001}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) socket(0x0, 0x7, 0x2) getsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010006c0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:41 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xffff8000) 10:04:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2400.174191] ebt_limit: overflow, try lower: 2147483647/65537 [ 2400.284802] XFS (loop0): SB sanity check failed [ 2400.289650] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2400.300946] XFS (loop0): Unmount and run xfs_repair [ 2400.308491] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2400.316724] 00000000: 58 46 53 42 00 00 10 00 6c 00 00 00 00 00 10 00 XFSB....l....... [ 2400.325070] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2400.333305] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2400.341902] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2400.350185] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2400.358380] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2400.366595] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2400.374783] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:04:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c) 10:04:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) prctl$PR_SVE_GET_VL(0x33, 0x10f44) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:41 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x2) [ 2400.383003] XFS (loop0): SB validate failed with error -117. [ 2400.464400] ebt_limit: overflow, try lower: 2147483647/65537 [ 2400.491658] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000230000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0xe}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3, 0x109100) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x4) 10:04:42 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xf) [ 2400.633221] ebt_limit: overflow, try lower: 2147483647/65537 [ 2400.763659] XFS (loop0): SB sanity check failed [ 2400.770831] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2400.806241] XFS (loop0): Unmount and run xfs_repair [ 2400.815957] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2400.823508] 00000000: 58 46 53 42 00 00 10 00 00 00 00 23 00 00 10 00 XFSB.......#.... [ 2400.831824] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2400.840149] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2400.849909] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2400.858884] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2400.867293] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2400.875624] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2400.875638] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2400.892308] XFS (loop0): SB validate failed with error -117. 10:04:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) ftruncate(r0, 0x4) 10:04:42 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab2404cd]}}, 0x1c) 10:04:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000100)=""/95) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:42 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x2900000000000000) 10:04:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000680000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2401.044798] ebt_limit: overflow, try lower: 2147483647/65537 10:04:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f00000001c0)=@v2={0x5, 0x0, 0x7, 0x0, 0xe6, "23942f55bec2967a99c9b26e6f909f7080f052dc734deadd1ee27465a08f0cbbd4cb4ea77a9e44251a545e8896c07c6e435e351eed8b32ae509963f5a923e3338d080e69982c6d59f603628c904f2d901f55752bf316c4b944106e42ee6a12174e2bd677c471b774bd66b3629090020d613abef6ce24ae3ff0b7e2c1f372fadd547015f3d8646b08e9bc21d23bf87bb90d5826c94d4c927015beff72357f6c7d09624663b58c1c684e2b862b32e0dbe1818e1d0cd04b8e9731e9a45064c0fd2b553df18256573e433c30af6493128d0a3b2b87aef87c89d8e7e591a698099c2cdd253d037ed5"}, 0xf0, 0x1) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2401.186652] ebt_limit: overflow, try lower: 2147483647/65537 10:04:42 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x80ffff) [ 2401.295090] ebt_limit: overflow, try lower: 2147483647/65537 [ 2401.328289] XFS (loop0): SB sanity check failed 10:04:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x9c7a6283fc17c988) ioctl$VT_RELDISP(r2, 0x5605) [ 2401.340497] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2401.387140] XFS (loop0): Unmount and run xfs_repair [ 2401.407958] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2401.443948] 00000000: 58 46 53 42 00 00 10 00 00 00 00 68 00 00 10 00 XFSB.......h.... [ 2401.465103] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2401.486929] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2401.495491] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2401.503869] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2401.512119] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2401.523919] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2401.532313] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2401.540607] XFS (loop0): SB validate failed with error -117. [ 2401.635283] XFS (loop0): SB sanity check failed [ 2401.640370] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2401.651792] XFS (loop0): Unmount and run xfs_repair [ 2401.656957] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2401.663706] 00000000: 58 46 53 42 00 00 10 00 00 00 00 68 00 00 10 00 XFSB.......h.... [ 2401.671859] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2401.680043] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2401.688215] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2401.696391] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2401.704588] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2401.712790] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2401.720939] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2401.729169] XFS (loop0): SB validate failed with error -117. 10:04:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000640)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dc484d23b907b25fe8daa15dd5ea418fb2199267", @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@rand_addr, @empty, 0x0}, &(0x7f0000000300)=0xc) fstat(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@dev={0xac, 0x14, 0x14, 0x15}, @in6=@loopback, 0x4e24, 0x249, 0x4e20, 0x47, 0x2, 0x80, 0x20, 0x5e, r3, r4}, {0x9, 0x100000000, 0x1, 0x9, 0x3f, 0x2, 0x9, 0x4aba}, {0x10001, 0x81, 0x88, 0xa284}, 0x6, 0x6e6bb2, 0x0, 0x0, 0x1, 0x1}, {{@in6=@ipv4, 0x4d6, 0x2b}, 0x0, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x3, 0x5, 0x3f, 0x8, 0x3}}, 0xe8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = dup(r1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x9}, &(0x7f0000000180)=0x10) setsockopt$inet6_tcp_int(r6, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) sendto$inet6(r7, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000030000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r8 = gettid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r8, 0x401104000000016) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x7ff) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r9, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x84000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r10, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 10:04:43 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) 10:04:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvfrom(r0, &(0x7f00000014c0)=""/4096, 0x1000, 0x100, &(0x7f00000001c0)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x660}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x4825}, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) 10:04:43 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x3000000) 10:04:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100003ff00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2401.987264] ebt_limit: overflow, try lower: 2147483647/65537 10:04:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) pipe2$9p(&(0x7f0000000080), 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2402.201771] XFS (loop0): SB sanity check failed [ 2402.207661] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200080, 0x0) getsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000002240), &(0x7f0000000000)=0x1c5ead8ccb3a03e) 10:04:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2402.265134] XFS (loop0): Unmount and run xfs_repair [ 2402.270196] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2402.276934] 00000000: 58 46 53 42 00 00 10 00 03 ff 00 00 00 00 10 00 XFSB............ [ 2402.285967] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2402.302359] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:04:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) 10:04:43 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x11000000) [ 2402.323840] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2402.339122] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:04:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2402.408654] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2402.433781] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2402.441957] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2402.460751] XFS (loop0): SB validate failed with error -117. 10:04:44 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}}, 0x1c) 10:04:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:44 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x300) 10:04:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000d60300000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x15, &(0x7f0000000080)='self}+eth1*ppp0:eth0\x00'}, 0x30) sched_setscheduler(r1, 0x7, &(0x7f0000000140)=0x81) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='self}+eth1*ppp0:eth0\x00') r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000240)) 10:04:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x80000001, 0x80000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x0}, {}, {}]}) getsockopt$inet6_udp_int(r3, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000200)={r4, 0x20}) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2403.102882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2403.116409] XFS (loop0): SB sanity check failed [ 2403.124319] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2403.175611] XFS (loop0): Unmount and run xfs_repair [ 2403.185102] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2403.202258] 00000000: 58 46 53 42 00 00 10 00 d6 03 00 00 00 00 10 00 XFSB............ [ 2403.210436] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:04:44 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0x29b) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:04:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x3ff}}, 0x10) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000015c0)={r0, r0, 0x8, 0x8, &(0x7f00000014c0)="0a93ec0c6ede6dce478bf7bb26ce8a82cb7fbae1fd32a792b8ab7f7aae9ba19c553654cca534a51900125e0b2ad819d7c6f4131e639d282b625c484311a1e6ed42ad7e835691c8b69bbf6374644a44f1f2bad810a1a256e7006b45b3cdbf3b390e995fa233a74efd6dad818cb5088ecd6aec5d11440aafe84d9f4c4e146b4e0c4987e2fa7cca18f87ab379cdeae4618427c14f4e57e8d23f3ec3d5504acf552e8f00b24113cafd76ae2fbc526e5ee6df0ddbe609a8d5f06a83a0d279d5e132aa6753e6fc0c63f7566d7701c04d4d26bcb4b89bef4de14465b0a0388c6316e22964828e8b637a9d39eee3910ffa3a4158f656827866", 0x800, 0x2, 0x4, 0x5, 0x7fff, 0x3, 0x80, "6d474840dd52374d416249779e98fea6308fd95846fea9369854e472aeec3903608630c85be1ae97ece8d6f3fb41573d06daa5e677670359cb0ca9756c106644ee900c523088279e20fb1558f66868bef02bfa30d5e51bcf18a819ae83f5f2ece838e9259d7ca66e3a661c1b8ef8a69001a43260365f54102e9a4ea7de074fc62e9b56ce7ea2fd6fac304353a58648dbcead61fe7bcf85f604c500980dd51d66ecb834c1e652a748085c377480b44dc867a22679b65442c8f0183c579f2a4940ab60d8c096b6f13ddd6144d1d43d46478eef2a8d2190ef03402a509e1d08fbba49d636e8812152f1b36ce853125cd32a"}) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='autogroup\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfeffffffffffffff) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@dev, @rand_addr}, &(0x7f0000000140)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2403.236825] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2403.254828] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:04:44 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78a0]}}, 0x1c) 10:04:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2403.304823] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:04:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x2, {0x7, 0x1c, 0x5, 0x20000, 0x5, 0x2, 0x6f3, 0x1}}, 0x50) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000015c0)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000012c0)=0xe8) write$P9_RREADLINK(r2, &(0x7f0000001740)={0xa, 0x17, 0x2, {0x1, '.'}}, 0xa) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000001340)={r3, 0x1, 0x6, @local}, 0x10) write$vnet(r2, &(0x7f00000016c0)={0x1, {&(0x7f00000001c0)=""/230, 0xe6, &(0x7f00000014c0)=""/202, 0x3, 0x6}}, 0x68) [ 2403.368888] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2403.437546] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2403.451604] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:04:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xfcf5, 0x40040) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000100)={0x3ff, 0x0, 0x1, 0x40}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x96, "dbcbdab1fd40c94730a6f4de3560528d66b269e814c1942bc53a83e9932c13ff9509a17997e0fe3050a316c321947ba8d4a60857fb3a8ea0568c7bbbbea4ed0c2f83594cc5fb9af762de7e2b2c3c4a7d6e0e38265df0d7d9909f36f430283b0eb5b45d14c74e124b77e01bb250065585f6c66f557c9ed9f72a03d19e0bb9f622f7fac3342f3bcaf903914717edf11cd2cd64fa92730e"}, &(0x7f00000012c0)=0x9e) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000001340)={r5, 0xced5, 0x4}, &(0x7f00000014c0)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x401, r3, 0x10000, 0x7fffffff}) [ 2403.478454] XFS (loop0): SB validate failed with error -117. 10:04:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000020000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) socket$bt_bnep(0x1f, 0x3, 0x4) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2403.830742] XFS (loop0): SB sanity check failed [ 2403.839724] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2403.881669] XFS (loop0): Unmount and run xfs_repair [ 2403.887583] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2403.894889] 00000000: 58 46 53 42 00 00 10 00 02 00 00 00 00 00 10 00 XFSB............ [ 2403.903965] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2403.912701] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2403.921247] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2403.930380] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2403.939179] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2403.947884] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2403.956612] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2403.965458] XFS (loop0): SB validate failed with error -117. 10:04:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="004af5faefa33f3b2418e6df2e2c94a24533e04ff499018e975ab608cc2967dd29b0aa3c8f04647c305229b551bcff9a11eef6931e0c37ea500567edabbf8ba5c6"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r1, 0x9) pipe(&(0x7f00000001c0)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:04:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) pipe(&(0x7f0000000080)={0xffffffffffffffff}) write$P9_RREADLINK(r1, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r2, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:45 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 10:04:45 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x8082, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x40, 0xc20, 0xffffffffffffffe0, 0x80000001, 0x100000000, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x1, @local, 0x9}, 0x1c) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000001c0)=""/4096) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) mknod(&(0x7f0000000040)='./file0\x00', 0x4000001b00, 0xe16c) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f00000011c0)=""/78) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000180)=0x80f) 10:04:45 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000260100000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0xffffffffffffff08) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000100)={0x2, 0x7000, 0x6, 0x6, 0xfe8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) recvmsg(r2, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000140)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x10, &(0x7f0000000200)={&(0x7f00000001c0)=""/10, 0xa, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r4, 0x4) 10:04:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000001000/0x2000)=nil, 0x2000}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000440)=@llc={0x1a, 0xffff, 0x7, 0x100000001, 0x9, 0x100000000, @link_local}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)="0ba29ba1865608170a53bcf0444f05996a932401c4f20933b943b381d27d8f4ef9db268bf625dbdf574d979881576071c7cb1f4aeeb51bf0db9816b0028b8b7541741c884a969d67d0ba984368671d49d135", 0x52}, {&(0x7f0000000540)="d2e36a71c8e9d2caa49d7d79fa092d5360f313141f6b6292e5c8180579be0b3ddc5e23c9de284a5874b065f88bccb3da7329f6dd40fca4294114909ca885532cfb23e1de66c00eded3d2a3f807b25edfa43dfabfcaade2c7008227e8e996fed18222d61b6ef02e313ed4f9b50aee1e2e1c777db2bd93e7639a57b14a1ec296f0881eca500a29ad97f13f49ad857b368e28058ca5c7ddd1f84b3cef8e57f4b68ca07635dda5117cac474e5cd8ce0a0cb9719f341e4b411ff99ebee7afd4ecc1e80624d8819c9629b24b5a6df206342b399b0d15e9d4dda07480157db2394d6944099fffeb021b", 0xe6}, {&(0x7f0000000200)="8871f183292e452225ca21", 0xb}, {&(0x7f0000000640)="7ce757e47b99c6c6d79c54f7754645de1a61ec55312eae3cc953e543c651c1d7cd4bed2dfc505f7089dcf0a5927d55768cb00fbf01b5c874e4113e973581c4b96f50a4865f5a", 0x46}, {&(0x7f00000006c0)="7e0f123963fe2e1971a8c5db92a3289ba8366960a62eb0b11d0ef6bcdfe6e08a7347832ea019a27bc98e1a819ff26228395f4c87c6aa7f3396ba054bdfc040db2eb7886ca850b2f49a85a7b6b20b6d567c2ee4bde6", 0x55}], 0x5, &(0x7f00000007c0)=[{0x38, 0x110, 0x7fffffff, "ccd81680d804c3e7fe94088b58e73056c662d9fd321879b505d76dbc48f788978993ad533912c23c"}, {0xf8, 0x10a, 0x9, "d32605f514d26b57752e3ec758eff79885f733233787c3d3190e49a81baa1adfd7d33abcd40b1a3c58b3c1eeff43e2f916391436ce396286163b4d1de0b45e4a31378a2e1ffb57e95530732fd3869e8779d293545c9ae70923db569565bb47f22916d6cdec21d68a20ffb62aff01192f4b31c645fbc5e5fa7ce3263bf2e5e0ccd2a6669636bb7afb20e28afa7f12a7324978f9554f9b88f0c50d3a417e875ba39902ac8743e2949340aa303f875c282ab01003f3e3fcb29017929ab4052495c8684d79f3082b21503b053868795e0c4a7ef51309a32412414838484e5be577f379bbdd805b2bab"}, {0x18, 0x11f, 0xfffffffffffffff7, "112fc0f4f69c"}], 0x148, 0x4080}, 0x0) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:04:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r5, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80400000001, 0x240) connect$inet(r5, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) sendto$inet(r5, &(0x7f0000000100), 0xffffffffffffff1f, 0x0, 0x0, 0x56c3) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000001c0), 0x14) close(r5) r6 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$bt_hci_HCI_DATA_DIR(r6, 0x0, 0x1, &(0x7f0000000140)=0x200, 0x4) r7 = dup3(r3, r4, 0x0) connect$inet(r7, &(0x7f0000000080)={0x2, 0x4e24, @broadcast}, 0x10) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2404.500805] XFS (loop0): SB sanity check failed [ 2404.506933] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2404.532339] XFS (loop0): Unmount and run xfs_repair [ 2404.539828] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2404.551397] 00000000: 58 46 53 42 00 00 10 00 26 01 00 00 00 00 10 00 XFSB....&....... [ 2404.559948] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2404.568527] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2404.577197] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2404.590958] ebt_limit_mt_check: 12 callbacks suppressed [ 2404.590967] ebt_limit: overflow, try lower: 2147483647/65537 [ 2404.607100] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2404.615675] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2404.624467] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2404.624973] ebt_limit: overflow, try lower: 2147483647/65537 [ 2404.632796] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:04:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2404.647331] XFS (loop0): SB validate failed with error -117. 10:04:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/dev_snmp6\x00') ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000100)) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000140)=0x68) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:46 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000280)=0xb) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x10001, @mcast1, 0x4}, 0x1c) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 2404.730845] ebt_limit: overflow, try lower: 2147483647/65537 10:04:46 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) 10:04:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000e80300000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:46 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) accept(r0, &(0x7f0000000280)=@nfc_llcp, &(0x7f0000000300)=0x80) 10:04:46 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:04:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xfffffffffffffffa}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x2, 0x10001}, 0xc) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000001c0)=0x8001) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2405.363085] ebt_limit: overflow, try lower: 2147483647/65537 10:04:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:46 executing program 3: 10:04:46 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000440)="d850359616312319d9f80f8e5c9602e3495bb58f417d1e91a9ee698054976a5b0c6cbde719c3175ef8c69766ea9bce06b3f463a1e19fe3beb3792fa7311899e0f22828c2bc96de13180c1b36a70f75ad4ac2f7bb136dc745117037c4a1f60c5d0e8034d2ca9047e1e3a4cf70ab73397abf66ae8f83f8617952e647523e106ff359597cc9a71ff5b06dd4f72ff4424725aa235329821976", 0x97}], 0x1, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000008000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2405.489200] ebt_limit: overflow, try lower: 2147483647/65537 [ 2405.525305] XFS (loop0): SB sanity check failed 10:04:46 executing program 3: 10:04:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2405.532795] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2405.552961] XFS (loop0): Unmount and run xfs_repair [ 2405.565701] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:04:46 executing program 3: [ 2405.594472] 00000000: 58 46 53 42 00 00 10 00 e8 03 00 00 00 00 10 00 XFSB............ [ 2405.616156] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2405.646760] ebt_limit: overflow, try lower: 2147483647/65537 [ 2405.647453] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2405.673811] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2405.688545] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2405.697214] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2405.724759] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2405.736998] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2405.745644] XFS (loop0): SB validate failed with error -117. 10:04:47 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c) 10:04:47 executing program 3: 10:04:47 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000001ee0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:47 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x24080, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x7f, 0xc9, 0xccb, 0x0, 0x0, 0x0, 0x80, 0x3f, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x5, 0x0, 0x8, 0x0, 0x8, 0x200, 0x0, 0x0, 0x0, 0x4, 0x5, @perf_bp={&(0x7f00000014c0)}, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800}, 0x0, 0x0, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e21, @multicast1}}, 0xffffffffffffff7f, 0x2}, 0x90) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000480)) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0xfffffffffffffa3d, 0x42) pipe(&(0x7f0000000080)) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:04:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfffffffffffffffd, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000200)=0xc) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000240)={[], 0x6436cad7, 0xfffffffffffffffa, 0x1f, 0x84d, 0x4, r3}) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2406.314201] ebt_limit: overflow, try lower: 2147483647/65537 10:04:47 executing program 3: 10:04:47 executing program 5: memfd_create(&(0x7f0000000180)='/dev/dsp#\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xa11, 0x30002) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000080)={0x1, 0x10001}, 0x2) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000000200), &(0x7f00000001c0)=0x4) fdatasync(r1) 10:04:47 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2406.425041] XFS (loop0): SB sanity check failed [ 2406.430078] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:47 executing program 3: [ 2406.478669] XFS (loop0): Unmount and run xfs_repair [ 2406.490221] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2406.506422] 00000000: 58 46 53 42 00 00 10 00 00 00 01 ee 00 00 10 00 XFSB............ [ 2406.510643] ebt_limit: overflow, try lower: 2147483647/65537 [ 2406.537531] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2406.564301] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:04:47 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2406.599945] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:04:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_CHILD_SUBREAPER(0x25) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="145f4200000000000000b5af7b197d64d7ef93f904fea30000000000370032b3420300f3080005000000000000000000000000000200006322b03b91a1cb258d97e82a28b2788a20ee17b93dfd40653bcf7ba32b8caa2c812ab2f2dc6cdaf579da71ec7d0209838b75c5547eb3d1db98b18ae0dc855b27e4b50e48c316a693f2f84d5a189ca6b1487637c989558b930f35d19ecbc373d259e0d179a8cb787e61ff7043d6bb31d136d92edf63a253aceb15e74772676cb03793c3422bc768d5f1af6b139ce07c2d4add48d307016079c3243e5db033d8"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000140)={0x7fff, 0x7, 0x7ff, 0x7fff, 0x3, 0x9819}) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000640)={0xffffffffffffffff}) bind$vsock_stream(r4, &(0x7f0000000200)={0x28, 0x0, 0x2710, @host}, 0x10) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 2406.655521] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2406.663912] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2406.672300] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2406.680565] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2406.691420] XFS (loop0): SB validate failed with error -117. [ 2406.719965] ebt_limit: overflow, try lower: 2147483647/65537 10:04:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c) 10:04:48 executing program 3: 10:04:48 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x548d, 0x240) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@local, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:48 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100002f000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000200)={0x10000, 0x59565955, 0x5, 0x1, 0x3, @discrete={0x49, 0x2}}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x280000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:04:48 executing program 3: 10:04:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x20010, r1, 0x0) [ 2407.340556] ebt_limit: overflow, try lower: 2147483647/65537 10:04:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf38"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r2, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) fchdir(r0) 10:04:48 executing program 3: 10:04:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2407.414463] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2407.437277] XFS (loop0): SB sanity check failed [ 2407.457390] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:48 executing program 3: [ 2407.512837] XFS (loop0): Unmount and run xfs_repair [ 2407.524827] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2407.541697] 00000000: 58 46 53 42 00 00 10 00 02 f0 00 00 00 00 10 00 XFSB............ 10:04:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80e3010000000000]}}, 0x1c) 10:04:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2407.569415] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2407.589223] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:04:49 executing program 3: [ 2407.619026] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2407.639385] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2407.653574] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:04:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2407.674574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2407.687948] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2407.719863] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2407.740709] XFS (loop0): SB validate failed with error -117. 10:04:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000001800000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:49 executing program 3: 10:04:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2408.072332] XFS (loop0): SB sanity check failed [ 2408.077313] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2408.089491] XFS (loop0): Unmount and run xfs_repair [ 2408.096402] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2408.103970] 00000000: 58 46 53 42 00 00 10 00 00 00 01 80 00 00 10 00 XFSB............ [ 2408.112583] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2408.120874] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2408.129489] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2408.147350] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2408.159130] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2408.167857] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2408.176595] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2408.185410] XFS (loop0): SB validate failed with error -117. 10:04:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:49 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c) 10:04:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:49 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_STOP(r4, 0x54a1) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:04:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000015900000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:49 executing program 3: 10:04:49 executing program 3: 10:04:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2408.385844] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:49 executing program 3: 10:04:49 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, 0x1c) 10:04:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:49 executing program 3: [ 2408.654191] XFS (loop0): SB sanity check failed [ 2408.654946] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2408.662408] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2408.710556] XFS (loop0): Unmount and run xfs_repair [ 2408.739229] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2408.761427] 00000000: 58 46 53 42 00 00 10 00 01 59 00 00 00 00 10 00 XFSB.....Y...... [ 2408.774386] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2408.792469] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2408.811022] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2408.822495] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2408.830686] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2408.842296] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2408.850695] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2408.859401] XFS (loop0): SB validate failed with error -117. 10:04:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000400), &(0x7f0000000440)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x20, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000200)=0xe8) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000300)={0xa0, 0xfffffffffffffffe, 0x4, {{0x5, 0x2, 0x100000001, 0x1, 0x107c8000, 0x800, {0x1, 0x8, 0x101, 0x380000, 0x7ff, 0x2, 0x8, 0x8, 0x3, 0x10, 0x0, r4, r5, 0x6, 0x7}}, {0x0, 0x2}}}, 0xa0) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:50 executing program 3: 10:04:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:50 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}}, 0x1c) 10:04:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000007ff54ea2ab3000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:50 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x6, &(0x7f0000000280)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$alg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="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", 0xfc}, {&(0x7f0000001540)="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", 0xfc}, {&(0x7f0000001640)="8443d4d9306e5e42f9e2f56025349790899b1f83dcdd023d0ca1d2716e62a05299e9b858bf21ce83c060758ebd951e6c2695dbc341a0e5678afe56995cba66f05ddcd69af86924968675bb255a97802d8554a0e22f3337d5441fdc1ea9ed61827983e5623df0204c6d77640b0d2094c4cf028ee9f6baad7952335d69f7f6a72f239e65a7e6d69ad459c8dc922b7545e1", 0x90}, {&(0x7f0000000140)="8988196c8ce4aa3db3be16a1e5374fee3bf0501cbff281645bc085a414497cefa0b67a1604dd17a0a3fbe242ad6279a742e82f38780b79a713db17e6", 0x3c}], 0x5, &(0x7f0000001780)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18}, @iv={0xc8, 0x117, 0x2, 0xb2, "71b60ba24c9b37767bee20a432bb19a6bcc8ab7eafea37ad46f8a53dc4eafd8703244d64e1047c394c1070c2d857cba4cfbd9178909b2ffa2f788ac790aa0668640a355055e883803d214e5771e5f840798bb524dddf0640ff69b936517c2d8e8df6f9ce48fda36cfd306c254555fcfedb9731a49b7cd4cd88371e54e62a6a8de2420e16d02db40df62e0c6d74172bf86deee23a4e9ac2e6cb7779fc849e925a88388d035e2bef0a5626b9d8b8c8eb8293b1"}, @iv={0x38, 0x117, 0x2, 0x1e, "d3436a51544f03b5c46cdc4a8d3c5b947ef8be296321a70b6eee397cd49c"}, @iv={0x90, 0x117, 0x2, 0x75, "9c9db157413fcaddcecb7831e89c17f2cb4e13b73cac6137a0592c50504bebee0e67da24fe17d5d303cd50ab32ddd30819349533f604003e5e9e8bda1546c3af6af864bcd8589968f5701f4c0034114a23081543162c32f3847c7d2b5b43f74e0f069260d7732858503282a5425b6f8ff020678fb5"}, @iv={0xa0, 0x117, 0x2, 0x89, "e696c7742c1a68292a64baff8571409f6ff4014a24c47278121846e714fadb3fc5dcb7e465765fcd4077462d9fcb673e37f25e01ccc8342518f45164152191f2cc3cff50a4ae6969176d66b650daf13578a1862a8400a775309daa0c175e640f9ce9f4e4f3f4f3bc08c5a54e8fde6f3f3da7a8ed495738a428e44d808786d8f9e448fbf37b9ddd0d01"}, @assoc={0x18}, @iv={0x58, 0x117, 0x2, 0x44, "89f5302356772a87a811efb91c112b346f2890cb3a9131f5f98ed681bbff7cec58c6952d0dc84af0623e6aa3ba7e40810ec2d4c20b58086f868312c4f2bfc3fa4c60ba5a"}], 0x2e8, 0x8000}, 0x4000000) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x54bb00000) 10:04:50 executing program 3: [ 2409.354425] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:50 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) 10:04:50 executing program 3: 10:04:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f0000000140)=""/74, 0x4a}, &(0x7f00000001c0), 0x40}, 0x20) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) ioctl$sock_ifreq(r1, 0x8943, &(0x7f0000000100)={'bond_slave_1\x00', @ifru_settings={0x7, 0x2, @raw_hdlc=&(0x7f0000000080)={0x44, 0xffff}}}) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2409.468700] XFS (loop0): SB sanity check failed [ 2409.480368] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2409.543266] XFS (loop0): Unmount and run xfs_repair [ 2409.560240] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2409.583234] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:04:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:50 executing program 3: [ 2409.605321] 00000000: 58 46 53 42 00 00 10 00 00 00 7f f5 4e a2 ab 30 XFSB........N..0 [ 2409.614600] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2409.627663] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:04:51 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) getdents(r1, &(0x7f0000001440)=""/4096, 0xffffffffffffffe8) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) remap_file_pages(&(0x7f000000c000/0x1000)=nil, 0x1000, 0x8, 0x8, 0x8800) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 2409.649002] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2409.672318] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2409.691206] ebt_limit_mt_check: 11 callbacks suppressed [ 2409.691215] ebt_limit: overflow, try lower: 2147483647/65537 10:04:51 executing program 3: 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0780000]}}, 0x1c) [ 2409.694623] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2409.754391] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2409.788697] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2409.806705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2409.827494] XFS (loop0): SB validate failed with error -117. 10:04:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:51 executing program 3: 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) 10:04:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000023c0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:51 executing program 3: [ 2410.049287] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2410.060659] ebt_limit: overflow, try lower: 2147483647/65537 10:04:51 executing program 3: [ 2410.204281] XFS (loop0): SB sanity check failed [ 2410.211460] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2410.237173] XFS (loop0): Unmount and run xfs_repair [ 2410.243625] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2410.255556] 00000000: 58 46 53 42 00 00 10 00 00 00 02 3c 00 00 10 00 XFSB.......<.... [ 2410.278603] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2410.287053] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2410.295489] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2410.304146] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2410.313153] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2410.321459] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2410.329878] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2410.338502] XFS (loop0): SB validate failed with error -117. 10:04:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3a) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x7, [0x6, 0x8, 0x43, 0x3, 0x3, 0x0, 0x100000000]}, &(0x7f0000000140)=0x16) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x1, 0x80000000}, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c) 10:04:51 executing program 3: 10:04:51 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="000000000000fcdbdf25de7fa701c24ee29cfd381076bc953996e69c379df3d4560a53516ba028770b24af6bff4dd66178a43cb572d9af968769e41e51936b0b7bf6bbec06a9c468a4"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000200)={0x21, &(0x7f0000000140)=""/33}) ioctl$KVM_RUN(r6, 0xae80, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f00000006c0)={@empty, @local, 0x0}, &(0x7f0000000700)=0xc) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000740)={r7, 0x4, 0x100000000, 0x400000, 0x8, 0x7, 0x8}) 10:04:51 executing program 3: [ 2410.424107] ebt_limit: overflow, try lower: 2147483647/65537 10:04:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000001280000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:51 executing program 3: 10:04:52 executing program 3: [ 2410.593911] ebt_limit: overflow, try lower: 2147483647/65537 [ 2410.614759] XFS (loop0): SB sanity check failed [ 2410.629978] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2410.652345] XFS (loop0): Unmount and run xfs_repair [ 2410.681352] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2410.715578] ebt_limit: overflow, try lower: 2147483647/65537 [ 2410.716507] 00000000: 58 46 53 42 00 00 10 00 00 00 01 28 00 00 10 00 XFSB.......(.... 10:04:52 executing program 3: [ 2410.742361] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2410.750552] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2410.783605] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2410.799925] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2410.831761] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2410.852659] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2410.868314] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2410.879060] XFS (loop0): SB validate failed with error -117. 10:04:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x88) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x6, 0x4, 0x3, 0x20]}) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8001, 0x100) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000100)=""/222) 10:04:52 executing program 3: 10:04:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r1, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:04:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100003e800000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:52 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c) 10:04:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) [ 2411.385708] ebt_limit: overflow, try lower: 2147483647/65537 [ 2411.409990] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:52 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x24) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2411.483424] XFS (loop0): SB sanity check failed [ 2411.498697] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2411.521277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:52 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x1c) [ 2411.549007] XFS (loop0): Unmount and run xfs_repair 10:04:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:52 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000140)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x1000000000016) [ 2411.575903] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:04:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffffa) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2411.617544] 00000000: 58 46 53 42 00 00 10 00 03 e8 00 00 00 00 10 00 XFSB............ [ 2411.650583] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2411.680165] ebt_limit: overflow, try lower: 2147483647/65537 [ 2411.687566] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2411.697457] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2411.712457] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:04:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2411.730683] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2411.742356] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2411.750788] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2411.760208] XFS (loop0): SB validate failed with error -117. [ 2411.849407] ebt_limit: overflow, try lower: 2147483647/65537 10:04:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1b0000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:04:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000fff00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000300)) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000001c0)) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x100002000000105, &(0x7f0000000080)=0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f0000000500)={0x10}, 0xfffffffffffffd7f) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001e40)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001f40)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000000040), 0xc, &(0x7f00000021c0)={&(0x7f0000002000)={0x14, 0x0, 0x400, 0x70bd27}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x80) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 2411.991636] ebt_limit: overflow, try lower: 2147483647/65537 10:04:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2412.091321] ebt_limit: overflow, try lower: 2147483647/65537 [ 2412.100293] XFS (loop0): SB sanity check failed [ 2412.105317] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2412.120901] XFS (loop0): Unmount and run xfs_repair 10:04:53 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000540)={{{@in=@broadcast, @in6}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x0, [0xc0000103], [0xc1]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'vlan0\x00', {0x2, 0x0, @remote}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 2412.168442] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2412.200209] 00000000: 58 46 53 42 00 00 10 00 0f ff 00 00 00 00 10 00 XFSB............ [ 2412.239462] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2412.273650] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2412.292656] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2412.305318] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2412.313767] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2412.331459] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2412.342758] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2412.357595] XFS (loop0): SB validate failed with error -117. 10:04:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000080)={0x4, 0x4, 0x6, 0x100, 0x7fff, 0x8}) sendto$inet6(r1, &(0x7f0000000180)="1b1eb4ee9b5c3368eff891160702440243d010ed05cad4e488e79af8f7e9bc1a29f384096322be2d1ce60cc35faea7f2ba345b9acc90adb4daaddd44377cfbd3cac230ec84461b715259c0c1f05f8316149a6734061fc443b7637d82e28fe19a51079ed188d47438a05b3983ce411388d7c31bdf6c0beac331e05dc105e1367fc59636c53bf2ba", 0x87, 0x0, &(0x7f0000000240)={0xa, 0x4e21, 0x17, @ipv4={[], [], @multicast1}, 0x8a}, 0x1c) 10:04:53 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c) 10:04:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000400), 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0x68, r1, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[], 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0xd2, 0xd3, 0xb2a, 0x1, 0x10001, 0x40, 0xffffffffffff0001, 0x7bdb, 0x183, 0x7c, 0xffff}, 0xb) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) mmap(&(0x7f0000b39000/0x1000)=nil, 0x1000, 0x3000009, 0x11, r0, 0x0) mmap(&(0x7f0000a35000/0x400000)=nil, 0x400000, 0x1000006, 0x2013, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x2, 0xfffffffeffffffff, 0x1000, 0xfffffffffffffb76}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/253, 0xfd, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x1, 0x1000}, 0x4) 10:04:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010005c0100000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2412.657844] XFS (loop0): SB sanity check failed [ 2412.667264] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2412.712378] XFS (loop0): Unmount and run xfs_repair [ 2412.718013] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2412.736970] 00000000: 58 46 53 42 00 00 10 00 5c 01 00 00 00 00 10 00 XFSB....\....... [ 2412.755730] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2412.773650] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2412.792851] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2412.809625] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2412.826407] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2412.841931] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:04:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1000000, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@debug={'debug', 0x3d, 0x5b3}}, {@msize={'msize', 0x3d, 0xff}}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@access_uid={'access', 0x3d, r4}}, {@posixacl='posixacl'}, {@cache_fscache='cache=fscache'}], [{@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fowner_gt={'fowner>', r5}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x35, 0x37, 0x38, 0x0, 0x63, 0x64, 0x36], 0x2d, [0x39, 0x63, 0x67], 0x2d, [0x64, 0x79, 0x7e, 0x34], 0x2d, [0x32, 0x30, 0x64, 0x30], 0x2d, [0x77, 0x66, 0x38, 0x31, 0x7f, 0x7f, 0x64, 0x7b]}}}, {@smackfstransmute={'smackfstransmute'}}, {@measure='measure'}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>', r6}}]}}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 10:04:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2412.858291] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:04:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2412.884057] XFS (loop0): SB validate failed with error -117. 10:04:54 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010008c0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000980100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2413.219897] XFS (loop0): SB sanity check failed [ 2413.225043] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2413.264125] XFS (loop0): Unmount and run xfs_repair [ 2413.279437] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2413.294975] 00000000: 58 46 53 42 00 00 10 00 8c 00 00 00 00 00 10 00 XFSB............ [ 2413.321141] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2413.349871] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2413.368108] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2413.383681] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2413.398687] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:04:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x3, @dev={0xfe, 0x80, [], 0xa}, 0x9}, 0x1b) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000140)={0x5, 0xc000c, "94c6b76203a131e5065bf39bcb9a768ece7453d102520e16", {0x1, 0x800}, 0x8}) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000000080), &(0x7f0000000000)=0x4) 10:04:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:54 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) [ 2413.414828] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2413.433632] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2413.482369] XFS (loop0): SB validate failed with error -117. [ 2413.538031] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:04:55 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000180)={0x1, 0x2, [@dev={[], 0xf}, @random="c2e7bf8dd57b"]}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000100)={0x0, 0x1, [0x59, 0x400, 0x9, 0x6d, 0x5, 0x8001, 0x5a735ee8, 0xd7]}) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000380)={0xa4, 0x3, 0x0, {0x40000000007, 0xffffffffffffff8c, 0x0, "7f00000036060048d010c2d50c2feabfad2319ade7abc1477ebebf6b023d302503077325c9932f0600dc3db377ed1f033ea2084a113b444be4e81001d1a32b6f0622ab58095f88bc85e60301419541f4677728ede32053a61363aa7c23d2b584d97f0d4e103cd9a963a33ef333c9582d2bcf33c466343d9769f271d603c0f6382a366292379b3c8b"}}, 0xffffff95) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x4, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000c70300000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:55 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5400]}}, 0x1c) 10:04:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100003ff00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="145f420000000300000007ff000000000300de0006000000290000000000080000000000000008000500ac14141b0c0003001200e50e01f613f141bb0cbdb1e51bf4e7dedaaeb2996562f0b071967aabcaf0a3c61bdd35185ac7"], 0x1}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000440)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000200)={r1, 0x0, 0x8, r4}) pipe(&(0x7f0000000080)) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000004c0)='system_u:object_r:dmidecode_exec_t:s0\x00', 0x26, 0x2) write$binfmt_misc(r5, &(0x7f0000000500)={'syz0', "fc"}, 0x5) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:04:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x41, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2413.831942] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2413.854226] XFS (loop3): SB sanity check failed [ 2413.866014] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:55 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) [ 2413.953982] XFS (loop0): SB sanity check failed [ 2413.958931] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2413.965974] XFS (loop3): Unmount and run xfs_repair [ 2413.989130] XFS (loop3): First 128 bytes of corrupted metadata buffer: 10:04:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2414.021078] 00000000: 58 46 53 42 00 00 10 00 03 ff 00 00 00 00 10 00 XFSB............ [ 2414.025191] XFS (loop0): Unmount and run xfs_repair [ 2414.035817] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2414.060901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2414.065080] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2414.083023] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2414.087935] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2414.101063] 00000000: 58 46 53 42 00 00 10 00 c7 03 00 00 00 00 10 00 XFSB............ [ 2414.112239] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2414.124477] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2414.128505] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2414.149298] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2414.151416] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:04:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 2414.170345] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2414.174302] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2414.206755] XFS (loop3): SB validate failed with error -117. [ 2414.210983] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:04:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:55 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) [ 2414.233908] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2414.269273] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2414.310089] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2414.322294] XFS (loop0): SB validate failed with error -117. 10:04:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000003200000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3, 0x100) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xb6, 0x2040) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x7, 0x102) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f00000012c0)={0x4, 0x9, 0x9, 0x0, 0x4c73, 0x400, 0xffffffffffff0001}, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001b00)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'\x00', 0x0}) getpeername$packet(r2, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14) recvmsg$kcm(r2, &(0x7f0000001ac0)={&(0x7f0000001500)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001580)=""/139, 0x8b}, {&(0x7f0000001640)=""/10, 0xa}, {&(0x7f0000001680)=""/166, 0xa6}, {&(0x7f0000001740)=""/152, 0x98}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000001800)=""/197, 0xc5}, {&(0x7f0000001900)=""/62, 0x3e}, {&(0x7f0000001940)=""/95, 0x5f}], 0x8, &(0x7f0000001a40)=""/68, 0x44, 0x2}, 0x2001) accept$packet(r2, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001dc0)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000001ec0)=0xe8) getpeername$packet(r3, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001f80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000002200)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000002300)=0xe8) getsockopt$inet6_mreq(r5, 0x29, 0x1d, &(0x7f0000002600)={@dev, 0x0}, &(0x7f0000002640)=0x14) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000002680)={0x0, @rand_addr}, &(0x7f00000026c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000003cc0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000002700)={&(0x7f0000003780)={0x53c, r6, 0x20, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r7}, {0xf8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7611}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r8}, {0x158, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x5, 0x7ff, 0x0, 0x200}, {0x4, 0x5, 0xf8, 0x100}, {0x7fffffff, 0x5, 0x6, 0xffffffffffff7fff}, {0x40, 0x9, 0x1, 0x8}, {0x2, 0x5, 0x8}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0x1a4, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7, 0x8, 0xb2b, 0x7}, {0x1, 0x10001, 0x2, 0xffffffffffffff29}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r14}, {0x114, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x6, 0x6, 0xbe58, 0x7fffffff}, {0xfffffffffffffff8, 0x1, 0x1, 0x3f}, {0x980, 0x0, 0x100000000, 0x8}, {0x1, 0x8, 0x10001, 0x1}, {0x800, 0x401, 0x0, 0xc30}, {0x5, 0x1, 0x80, 0x5}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x42}}}]}}]}, 0x53c}, 0x1, 0x0, 0x0, 0x8000}, 0x8044) setsockopt$inet6_opts(r5, 0x29, 0x36, &(0x7f00000000c0)=@routing, 0x8) connect$inet6(r5, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r5, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) recvmsg(r4, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x200000, 0x0) 10:04:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) shmget(0x1, 0x4000, 0x20, &(0x7f0000005000/0x4000)=nil) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2414.630319] XFS (loop0): SB sanity check failed [ 2414.637845] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2414.667881] XFS (loop0): Unmount and run xfs_repair [ 2414.687009] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2414.722381] 00000000: 58 46 53 42 00 00 10 00 00 00 03 20 00 00 10 00 XFSB....... .... 10:04:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000080)=0x5) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2414.772424] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2414.802269] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2414.810589] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2414.819336] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2414.827976] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2414.836575] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2414.845130] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2414.845805] ebt_limit_mt_check: 14 callbacks suppressed [ 2414.845813] ebt_limit: overflow, try lower: 2147483647/65537 [ 2414.853871] XFS (loop0): SB validate failed with error -117. 10:04:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3, 0x100) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xb6, 0x2040) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x7, 0x102) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f00000012c0)={0x4, 0x9, 0x9, 0x0, 0x4c73, 0x400, 0xffffffffffff0001}, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001b00)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'\x00', 0x0}) getpeername$packet(r2, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14) recvmsg$kcm(r2, &(0x7f0000001ac0)={&(0x7f0000001500)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001580)=""/139, 0x8b}, {&(0x7f0000001640)=""/10, 0xa}, {&(0x7f0000001680)=""/166, 0xa6}, {&(0x7f0000001740)=""/152, 0x98}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000001800)=""/197, 0xc5}, {&(0x7f0000001900)=""/62, 0x3e}, {&(0x7f0000001940)=""/95, 0x5f}], 0x8, &(0x7f0000001a40)=""/68, 0x44, 0x2}, 0x2001) accept$packet(r2, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001dc0)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000001ec0)=0xe8) getpeername$packet(r3, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001f80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000002200)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000002300)=0xe8) getsockopt$inet6_mreq(r5, 0x29, 0x1d, &(0x7f0000002600)={@dev, 0x0}, &(0x7f0000002640)=0x14) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000002680)={0x0, @rand_addr}, &(0x7f00000026c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000003cc0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000002700)={&(0x7f0000003780)={0x53c, r6, 0x20, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r7}, {0xf8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7611}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r8}, {0x158, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x5, 0x7ff, 0x0, 0x200}, {0x4, 0x5, 0xf8, 0x100}, {0x7fffffff, 0x5, 0x6, 0xffffffffffff7fff}, {0x40, 0x9, 0x1, 0x8}, {0x2, 0x5, 0x8}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0x1a4, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7, 0x8, 0xb2b, 0x7}, {0x1, 0x10001, 0x2, 0xffffffffffffff29}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r14}, {0x114, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x6, 0x6, 0xbe58, 0x7fffffff}, {0xfffffffffffffff8, 0x1, 0x1, 0x3f}, {0x980, 0x0, 0x100000000, 0x8}, {0x1, 0x8, 0x10001, 0x1}, {0x800, 0x401, 0x0, 0xc30}, {0x5, 0x1, 0x80, 0x5}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x42}}}]}}]}, 0x53c}, 0x1, 0x0, 0x0, 0x8000}, 0x8044) setsockopt$inet6_opts(r5, 0x29, 0x36, &(0x7f00000000c0)=@routing, 0x8) connect$inet6(r5, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r5, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) recvmsg(r4, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x200000, 0x0) 10:04:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2414.987634] ebt_limit: overflow, try lower: 2147483647/65537 10:04:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000003c00000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2415.109557] ebt_limit: overflow, try lower: 2147483647/65537 10:04:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:56 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}}, 0x1c) [ 2415.237247] XFS (loop0): SB sanity check failed [ 2415.251334] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2415.296588] XFS (loop0): Unmount and run xfs_repair [ 2415.301828] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2415.333807] 00000000: 58 46 53 42 00 00 10 00 00 00 03 c0 00 00 10 00 XFSB............ [ 2415.366884] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2415.378519] ebt_limit: overflow, try lower: 2147483647/65537 [ 2415.390694] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2415.413763] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:04:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2415.443357] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2415.474200] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:04:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'bond_slave_1\x00', 0x4}, 0x18) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r2, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2415.506447] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2415.522845] ebt_limit: overflow, try lower: 2147483647/65537 [ 2415.545377] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:04:56 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="006a0700000400000000"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000140)=0xfffffffffffffffe, 0x4) socket$inet(0x2, 0x2, 0x3) [ 2415.554323] XFS (loop0): SB validate failed with error -117. 10:04:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x5, 0x80000000, 0xb70, 0xffffffffbabd3218, 0x0, 0x2, 0x2, 0x0, 0x7, 0x2, 0x1f, 0x941, 0x6, 0x8b7, 0x5, 0x3, 0x9, 0x4, 0x6, 0x2, 0x7133, 0x118047fe, 0x8, 0xe4, 0x2, 0x7060, 0x6, 0x4, 0x80000001, 0x9, 0x7fff, 0x2, 0x1, 0x4, 0x8, 0x3, 0x0, 0x8, 0x0, @perf_config_ext={0x5, 0xc32}, 0x10010, 0x24a0c622, 0xd, 0x8, 0x0, 0x1}, 0x0, 0x5, 0xffffffffffffff9c, 0x9) socketpair(0x1, 0x3, 0x91, &(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000001c0)=""/158) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000c400000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2415.681643] ebt_limit: overflow, try lower: 2147483647/65537 10:04:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2415.787428] ebt_limit: overflow, try lower: 2147483647/65537 10:04:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:57 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2415.939885] XFS (loop0): SB sanity check failed [ 2415.944795] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2415.964074] ebt_limit: overflow, try lower: 2147483647/65537 [ 2415.991793] XFS (loop0): Unmount and run xfs_repair [ 2416.018329] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2416.035674] 00000000: 58 46 53 42 00 00 10 00 00 c4 00 00 00 00 10 00 XFSB............ [ 2416.062382] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2416.079608] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2416.093100] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2416.101341] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2416.109646] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2416.117947] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2416.126536] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2416.135034] XFS (loop0): SB validate failed with error -117. 10:04:57 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}, 0x1c) 10:04:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2416.237473] XFS (loop0): SB sanity check failed [ 2416.244551] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2416.281303] ebt_limit: overflow, try lower: 2147483647/65537 [ 2416.298921] XFS (loop0): Unmount and run xfs_repair [ 2416.312411] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2416.340882] 00000000: 58 46 53 42 00 00 10 00 00 c4 00 00 00 00 10 00 XFSB............ [ 2416.358806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2416.368174] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:04:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2416.401060] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2416.442235] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2416.454069] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2416.469681] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2416.501849] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2416.519364] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2416.533438] XFS (loop0): SB validate failed with error -117. 10:04:57 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x2000, 0x1}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:04:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:57 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}}, 0x1c) 10:04:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000860000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2416.653595] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2416.670437] ebt_limit: overflow, try lower: 2147483647/65537 [ 2416.681034] Unknown ioctl -1071076861 [ 2416.831113] XFS (loop0): SB sanity check failed [ 2416.842441] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:04:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, 0xfffffffffffffffe, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:04:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:58 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c) 10:04:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2416.874530] XFS (loop0): Unmount and run xfs_repair 10:04:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2416.901372] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2416.926501] 00000000: 58 46 53 42 00 00 10 00 00 00 00 86 00 00 10 00 XFSB............ 10:04:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2416.961310] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2416.968237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2417.020749] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2417.069099] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2417.080260] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2417.103068] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2417.123188] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2417.131389] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2417.140941] XFS (loop0): SB validate failed with error -117. [ 2417.240082] XFS (loop0): SB sanity check failed [ 2417.245023] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2417.256353] XFS (loop0): Unmount and run xfs_repair [ 2417.261372] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2417.261387] 00000000: 58 46 53 42 00 00 10 00 00 00 00 86 00 00 10 00 XFSB............ [ 2417.261400] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2417.276612] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2417.293385] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2417.301684] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2417.310010] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2417.318278] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2417.326476] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2417.334817] XFS (loop0): SB validate failed with error -117. 10:04:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x404000, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000280)=""/38) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000200)={'IDLETIMER\x00'}, &(0x7f0000000240)=0x1e) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x1}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=r4, &(0x7f0000000380)=0x4) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000540)=""/228, &(0x7f0000000640)=0xe4) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) accept4$llc(r5, 0x0, &(0x7f0000000100), 0x80800) getsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000180), &(0x7f0000000000)=0x4) r6 = semget(0x3, 0x7, 0x200) semctl$IPC_INFO(r6, 0x1, 0x3, &(0x7f00000003c0)=""/163) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000480)={{0x1000, 0x9}, 'port0\x00', 0x10, 0x20, 0xdd, 0x1, 0x3, 0xcd4, 0x0, 0x0, 0x2, 0xe7}) 10:04:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:04:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2417.470282] Unknown ioctl -1071076861 10:04:58 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) 10:04:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000000d0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001780)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9, 0x3, {"6412414c9ea69cb7d8ad1b9ce78f8090"}, 0x9}}}, 0x90) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2417.599038] XFS (loop0): SB sanity check failed [ 2417.603991] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2417.604001] XFS (loop0): Unmount and run xfs_repair [ 2417.604011] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2417.604028] 00000000: 58 46 53 42 00 00 10 00 00 00 00 0d 00 00 10 00 XFSB............ [ 2417.604043] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:04:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:04:59 executing program 3: syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0xf}}, 0x20) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2417.708474] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2417.741349] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:04:59 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:59 executing program 3: syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff80000000, 0x80400) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2417.770753] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2417.788132] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2417.805032] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2417.819064] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2417.840265] XFS (loop0): SB validate failed with error -117. 10:04:59 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080007000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x400) 10:04:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:59 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:59 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c) 10:04:59 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000180000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:04:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:04:59 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x4) 10:04:59 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:04:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2418.562544] XFS (loop0): SB sanity check failed [ 2418.567472] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2418.580403] XFS (loop0): Unmount and run xfs_repair [ 2418.586631] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2418.599081] 00000000: 58 46 53 42 00 00 10 00 00 00 00 18 00 00 10 00 XFSB............ [ 2418.609934] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2418.618341] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2418.626742] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2418.635160] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2418.643585] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2418.651900] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:05:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000006a0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2418.660303] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2418.668770] XFS (loop0): SB validate failed with error -117. [ 2418.854380] XFS (loop0): SB sanity check failed [ 2418.859511] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2418.872336] XFS (loop0): Unmount and run xfs_repair [ 2418.877394] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2418.888707] 00000000: 58 46 53 42 00 00 10 00 00 00 00 6a 00 00 10 00 XFSB.......j.... [ 2418.896956] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2418.905184] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2418.913934] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2418.922105] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2418.930360] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2418.939551] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2418.947883] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2418.956189] XFS (loop0): SB validate failed with error -117. [ 2419.053899] XFS (loop0): SB sanity check failed [ 2419.059080] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2419.071951] XFS (loop0): Unmount and run xfs_repair [ 2419.078236] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2419.085436] 00000000: 58 46 53 42 00 00 10 00 00 00 00 6a 00 00 10 00 XFSB.......j.... [ 2419.096050] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2419.110853] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2419.120684] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2419.139420] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2419.149841] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:05:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) ioctl$TIOCNXCL(r1, 0x540d) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) write$FUSE_OPEN(r4, &(0x7f0000000140)={0x20, 0x0, 0x1, {0x0, 0x7}}, 0x20) 10:05:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2419.159600] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2419.168502] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2419.177007] XFS (loop0): SB validate failed with error -117. 10:05:00 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c) 10:05:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000b0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2419.476749] XFS (loop0): SB sanity check failed [ 2419.481564] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2419.506739] XFS (loop0): Unmount and run xfs_repair [ 2419.511892] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e402153b4014159bfef45776d32d0552a79076843ebed2b1b76a855b998f4c7a64fa7ad4c85fd1d295a630f2eb", 0x2d, 0xfffffffffffffffb) r3 = add_key(&(0x7f0000001580)='trusted\x00', &(0x7f00000015c0)={'syz', 0x3}, &(0x7f0000001600)="35d88ef073a95820a9a3114bb5e8a194e4199246bd6282e0c54f7846b4", 0x1d, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001500)=[{&(0x7f00000002c0)="3e59990eb8149709decc5defabb9a1ecae17", 0x12}, {&(0x7f0000000300)="b28b628cee7a4524e9d845c911007a23e133282915a2d16ca9df15f3a82a2a324b89c7cca2d17a0c25ffd29b590c8a98f028cca8516dae5e7b5788349fd7058eb89c3c8ed2e609b551934dd9ddd7ecb880c5b5e43b65e6c9cafc2b8817b30669148a686973e16c517db6dfdbb9cca9253f61aa6d90ed58ebe3d6627f0adef457bd7f6448698e013a36b9b179d9", 0x8d}, {&(0x7f00000003c0)="981eb5d278d6bc8f6b65544ab9554071063b945738286ed4ecdd14cbe052e70a371d6de833d9831012cb896d7194581bf9d1f4e2bc0f645d7f0a311cc0630f4408cd00d43ebed7377bc63c974976da1bae7506f5e9c3c0000b03a2d85af8e3f796100ab149c6fb69e09802641b46c0349759ae065a60b284018049424957eacf0a", 0x81}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f00000014c0)="5637239e71a8ac82647f265a93aea65b066bf25bedf20a61", 0x18}], 0x7, r3) r4 = accept4$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000100)=0x1c, 0x800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0xb, 0x9}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000001c0)={r5, 0x1000, 0x1, [0x800]}, 0xa) 10:05:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2419.519207] 00000000: 58 46 53 42 00 00 10 00 0b 00 00 00 00 00 10 00 XFSB............ [ 2419.527777] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2419.564061] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2419.597053] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2419.635626] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2419.664493] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2419.680813] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2419.692644] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2419.721248] XFS (loop0): SB validate failed with error -117. 10:05:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCNXCL(r1, 0x540d) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000280)={@empty, @multicast1, r4}, 0xc) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:05:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2420.004118] ebt_limit_mt_check: 15 callbacks suppressed [ 2420.004127] ebt_limit: overflow, try lower: 2147483647/65537 10:05:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c) 10:05:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000600000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2420.299358] ebt_limit: overflow, try lower: 2147483647/65537 [ 2420.343100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x2000000000000, &(0x7f0000000080), &(0x7f0000000100)=0x4) 10:05:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="0400000000000000000300de0006000000000000000000080000050000000008000500ac14141b080003000100000f0100000000000000"], 0x1}}, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2002, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) ioctl$KDSKBLED(r4, 0x4b65, 0x8) connect$bt_sco(r1, &(0x7f0000000200)={0x1f, {0x10000000, 0x8000, 0x8000, 0x1, 0x1ff, 0x7}}, 0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) msgget(0x1, 0x0) 10:05:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2420.429443] ebt_limit: overflow, try lower: 2147483647/65537 [ 2420.439783] XFS (loop0): SB sanity check failed [ 2420.448206] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2420.479518] XFS (loop0): Unmount and run xfs_repair [ 2420.486486] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2420.500265] 00000000: 58 46 53 42 00 00 10 00 00 00 00 60 00 00 10 00 XFSB.......`.... 10:05:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) [ 2420.550539] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2420.569830] ebt_limit: overflow, try lower: 2147483647/65537 [ 2420.588621] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2420.624459] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2420.659868] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2420.686557] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2420.718933] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2420.731703] ebt_limit: overflow, try lower: 2147483647/65537 [ 2420.737857] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2420.747410] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2420.756407] XFS (loop0): SB validate failed with error -117. 10:05:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b08e702000100000f016d557a6ba6d7c3370b176e42754a07d3408816a6e1a302e25dd386282c42670ba96bef555c2735e6d5231b3cf6fd980bd658d18124767ee7b9f5747ca77d9a15cd841648ac8c4f33e59b1ea5bbb4e595"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000003d60000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2421.045351] XFS (loop0): SB sanity check failed [ 2421.050297] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2421.062109] XFS (loop0): Unmount and run xfs_repair [ 2421.067695] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2421.074504] 00000000: 58 46 53 42 00 00 10 00 00 00 03 d6 00 00 10 00 XFSB............ [ 2421.082725] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2421.090854] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2421.099036] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2421.107232] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2421.115411] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2421.123571] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2421.131694] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2421.139967] XFS (loop0): SB validate failed with error -117. 10:05:02 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}}, 0x1c) 10:05:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x800, 0x0) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000140)) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) unlink(&(0x7f0000000080)='./file0\x00') getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="145f42000000000000000787050100000000de0006000c000600000000000810da2200000050bc79de593837faac14141b080003008d12200f01297f681fa5d91fc5ab12b6abec5079bea0"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100002c400000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2421.297846] ebt_limit: overflow, try lower: 2147483647/65537 10:05:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed149", 0x4b}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2421.342650] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e", 0x70}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2421.436082] ebt_limit: overflow, try lower: 2147483647/65537 10:05:02 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000]}}, 0x1c) 10:05:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2421.511712] XFS (loop0): SB sanity check failed [ 2421.529347] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1", 0x83}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2421.579501] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2421.590557] XFS (loop0): Unmount and run xfs_repair [ 2421.602883] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2421.611489] ebt_limit: overflow, try lower: 2147483647/65537 [ 2421.621012] 00000000: 58 46 53 42 00 00 10 00 02 c4 00 00 00 00 10 00 XFSB............ 10:05:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff000000000000]}}, 0x1c) [ 2421.656068] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2421.686660] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae", 0x8c}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2421.720692] ebt_limit: overflow, try lower: 2147483647/65537 [ 2421.730245] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2421.763908] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2421.767894] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2421.817892] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2421.839831] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2421.852588] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2421.885335] XFS (loop0): SB validate failed with error -117. 10:05:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2, 0x100) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x1f) 10:05:03 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000140)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) 10:05:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce", 0x91}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000f400000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0xfffffffffffffd77) [ 2422.242069] ebt_limit: overflow, try lower: 2147483647/65537 10:05:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df6", 0x93}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2422.342309] XFS (loop0): SB sanity check failed 10:05:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001580)="e788031c47a1a1636e979798dbfa3b544ab2a2aa0a7aa63f6d9335683dd11cfa72a94a2b55e4c4a115c5b4705d5aa6a5fc29a070127ba0f023d1947a8d411763a196e6937493bb1994530bd3c48e9dcd2ea6fa8453d831d6b200c072ff26d57517d78ee4cc90ecbc538a2077080ccf0c6b14c53ce990273144af84fd7bb35522fb635a623736c11bd0", 0x89}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2422.365941] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2422.404637] XFS (loop0): Unmount and run xfs_repair [ 2422.412729] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2422.450212] 00000000: 58 46 53 42 00 00 10 00 00 f4 00 00 00 00 10 00 XFSB............ [ 2422.472350] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2422.497327] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2422.523162] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2422.549409] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2422.568709] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2422.593740] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2422.616096] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2422.648874] XFS (loop0): SB validate failed with error -117. [ 2422.763177] XFS (loop0): SB sanity check failed [ 2422.768370] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2422.797036] XFS (loop0): Unmount and run xfs_repair [ 2422.802808] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2422.817913] 00000000: 58 46 53 42 00 00 10 00 00 f4 00 00 00 00 10 00 XFSB............ [ 2422.838180] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2422.846500] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2422.854808] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2422.863118] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2422.871329] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2422.879928] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2422.888237] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2422.896610] XFS (loop0): SB validate failed with error -117. 10:05:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de00060003000100000f010000000000000000000000000074d8ae098a5864e1d8aaa3d944f17e9d803f1c6eb4b5749bc876a7"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000440)={[0xf000, 0x5000, 0x4], 0x0, 0x20, 0x2}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) 10:05:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000feffff0700", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000e40100000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000003) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed149", 0x4b}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e", 0x70}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2423.275317] XFS (loop0): SB sanity check failed [ 2423.280189] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2423.311857] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2423.347219] XFS (loop0): Unmount and run xfs_repair 10:05:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1", 0x83}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2423.367678] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2423.392273] 00000000: 58 46 53 42 00 00 10 00 e4 01 00 00 00 00 10 00 XFSB............ [ 2423.407133] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2423.441833] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2423.468536] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:05:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) 10:05:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KDSETLED(r1, 0x4b32, 0xffffffffffff0000) setxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfb, 0x3) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000001b080003000100000f0132f475c4572c42a69e2dabe1b7921500a58108731b5aadc0d8080e97a71fe575b4f156c6299747504f2b7b54cf912c3524cc36e271faf09911693e7e726958f4a3eb140a12d328b5a2c7eb62c54f9a94304ba563000000000000000061a0f9547112b63b23a77b40500b926ddd15919092644202b5a8435d8762514bb1b4933edbb7ae39003ff856043181a3f3affc9e7c0952ff706088961ac763ad99fe802a8269d961af9359d8f6bc65b848c1caceaba6d665281d3b1bba510c6db5386800d7e6414f9be98dd69b43a49a8b98b6046ca5"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x6) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae", 0x8c}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2423.487953] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2423.501627] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2423.532126] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2423.592351] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2423.616955] XFS (loop0): SB validate failed with error -117. 10:05:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x8000000080a, 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r3, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x90041, 0x0) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000240)=""/10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce", 0x91}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000004c0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df6", 0x93}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2424.191892] XFS (loop0): SB sanity check failed [ 2424.196882] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2424.224013] XFS (loop0): Unmount and run xfs_repair [ 2424.229298] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2424.246638] 00000000: 58 46 53 42 00 00 10 00 00 00 00 4c 00 00 10 00 XFSB.......L.... [ 2424.257522] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2424.267380] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2424.276214] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2424.289308] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2424.307650] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2424.320751] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2424.337115] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2424.345824] XFS (loop0): SB validate failed with error -117. 10:05:05 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600]}}, 0x1c) 10:05:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000000100)="d73f1184f725ca9ac06c0e72871e4dfa86b0680e922271c3bb42d9909c50ae72c82b656515b858c6b84c14cafad631beecad6650f896e05621dcbaed99150df6165a25616c033d5de927c910679d7d3ee00fb69ca2bc", 0x56}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x4, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2424.464739] XFS (loop0): SB sanity check failed [ 2424.479163] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688b8", 0x95}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2424.522415] XFS (loop0): Unmount and run xfs_repair [ 2424.533300] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2424.560107] 00000000: 58 46 53 42 00 00 10 00 00 00 00 4c 00 00 10 00 XFSB.......L.... [ 2424.581744] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2424.606261] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2424.615134] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2424.624198] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2424.635275] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2424.647516] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2424.702526] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2424.710724] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2424.722613] XFS (loop0): SB validate failed with error -117. 10:05:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) ftruncate(r2, 0x4) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) flistxattr(r0, &(0x7f0000000100)=""/79, 0x4f) 10:05:06 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c) 10:05:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100003c700000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[]}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2425.101083] ebt_limit_mt_check: 13 callbacks suppressed [ 2425.101093] ebt_limit: overflow, try lower: 2147483647/65537 [ 2425.104481] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed149", 0x4b}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2425.142075] QAT: Invalid ioctl 10:05:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e", 0x70}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:06 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e380]}}, 0x1c) [ 2425.233697] XFS (loop0): SB sanity check failed [ 2425.245978] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1", 0x83}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2425.288010] XFS (loop0): Unmount and run xfs_repair [ 2425.304079] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2425.311081] ebt_limit: overflow, try lower: 2147483647/65537 [ 2425.324116] 00000000: 58 46 53 42 00 00 10 00 03 c7 00 00 00 00 10 00 XFSB............ 10:05:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2425.333152] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2425.342448] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2425.352098] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2425.360557] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2425.378934] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2425.404942] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2425.421803] ebt_limit: overflow, try lower: 2147483647/65537 [ 2425.428129] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2425.438257] XFS (loop0): SB validate failed with error -117. [ 2425.528311] XFS (loop0): SB sanity check failed [ 2425.535735] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2425.555675] XFS (loop0): Unmount and run xfs_repair [ 2425.560713] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2425.567645] 00000000: 58 46 53 42 00 00 10 00 03 c7 00 00 00 00 10 00 XFSB............ [ 2425.575835] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2425.584010] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2425.592211] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2425.600356] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2425.608531] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2425.616707] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2425.624906] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2425.633160] XFS (loop0): SB validate failed with error -117. [ 2425.937454] QAT: Invalid ioctl 10:05:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x402000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000011c0)={'tunl0\x00', {0x2, 0x4e20, @local}}) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) sendmmsg$nfc_llcp(r0, &(0x7f00000010c0)=[{&(0x7f0000000100)={0x27, 0x1, 0x2, 0x1a56a2af38897c9f, 0x7f, 0x1, "c36f55ce44160d39425596ad1d24944ff20fa4504b3083a79af7db0396aa58ccdec4a2dfa6c3912e6d7f585f2a7144df8e11e07ddf8a534694e6b2aa5c68de", 0x1e}, 0x60, &(0x7f0000000280)=[{&(0x7f0000000080)="f5a306f2caaf19501730eb109ef6b8b5cfb7dafc82b4478a6f55aa55943063", 0x1f}, {&(0x7f0000000180)="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", 0xfe}], 0x2, &(0x7f00000002c0)={0xf8, 0x100, 0xff, "42613742649cb3898c55a7cc4f70dac8bf1ac40b507406536ee5344bc59bf304141466e6c71f9fa0b9b357b5d258231ffbe0c5b996743153483b557ef139f9f9366f4c4c15c014194d1bee0ba5f80badc229a78186d8417e280fb371b0eb4d80413b8346924702c7c284e47f85a4dbf01dc6025185c0c68dd3cc5088467bd27dd0e4c31811902e713be1c9f88e9ad995d61ce992033f7459b60adbf329e144301eaaf44025bdd95b81ac16d121cc190a6fef2c221f8cab9197c5cb1dadb261ef4cc2901d91d1ded4f1c8c2522ba63712f73cf29725dda1a8568153e664e82ebc83dc3c"}, 0xf8, 0x24048041}, {&(0x7f00000003c0)={0x27, 0x1, 0x2, 0x0, 0x5, 0x5, "6bd9e7e53951c2b9976dd5e193179d3625acd9c3205ca6cd6e68b9521a886eadab260039f640330909ecbaea4fb90aca87a1e2f71ad7b0b07d9492f6e69ad2", 0x16}, 0x60, &(0x7f00000008c0)=[{&(0x7f0000000440)="a395c35b92182e3e4b7a1f49d69062cd38f605979f04a3bc67d277a4441c60888e7344706e8a6279fd0721d78b516877ea9e3a30b9b3aa3b7e3ac8e432b16ce06b7b146f8c27f6033a9ea20570ac05666303629ebcf765895b30120c5fbd8067dcde633fa2f12ad51a38950c338d9db740f8afe0eb7701770e27ddcb16aa4414c6a0aa4cd882ceb0c686be8341375fc87ee71a20e21275c2480e039753fe4bae91ef0c9f017579c0d45cf95f2d19ba7ac0b57baaac530fa179b9c6055c8c73d88f2bd51664293bc0", 0xc8}, {&(0x7f0000000540)="ae3d", 0x2}, {&(0x7f0000000580)="f8a8b323585d31be7ff5980c7cae5c8d8f376e0b52468075fa93598c63eedd12d73a732846e627bb4547db1cdc27aa9ef1", 0x31}, {&(0x7f00000005c0)="2605ceff332a108b958532e87c2c2219035e679f181339390de2e1d7d38b64eacbeaca3eb06be78c0a2ae380272e2df7c7235cbb9d1d03029c44e7dca93ee6758637a4e435777138317fc72df485c92f5d97ccef0fe761cbacf233dea8e12c72512da750d7dc724d8fa650c769a4a1e8232277ceb00b565b0e84125e7dcecb7c3173be7c498bf7c18e2ebbd54338dc8b16d01069895b5ddb6cd33a9e3dd79d24fcd63c5607792cad8c94230987ec71b9b6d39646d9decbe88c50384725514c4075c900c202", 0xc5}, {&(0x7f00000006c0)="96791e44b7631c9ed8b755e1f8e1863fa0d51f4dd3a0ff34763ec21aec3b787448f6429b55b078f951ec62694c0868ceb933c6d6b012ad0ba6230cb5739147b6fae5354f181cd7a24792deb5e46d7cd3442cf307c91044bf4f290b40623970e0067c4b9a29ee13d2987610ca77a7ac1a9614169e6b77e838c24ec53fb2b7f5b4b21ad87ad390d9b9", 0x88}, {&(0x7f0000000780)="ebb25ed4b4067c486ac2b8e15b478cd517692e31385c0fc06cd5ad79cb77f4ea0e234f81b66af02ede3aae140f72869b75d6d2e2e1ad76fcfdfcb8ff852fdcaf3cb712702a73fa0f275057a768b30cd44b072b61cd8872399da19f75591c6160", 0x60}, {&(0x7f0000000800)="868c6b0cfc00e7eb2c13abe0a8b17e6febff752907793fd432", 0x19}, {&(0x7f0000000840)="410ee9df331b32da8ee5e561b0f420a7671b67b764c776009d9d34edc1e247ec010a28efd3cc7294a4d38b614f7a6fcaac37c6456896e874ad868b2bbc5a5eb6c4856e3a96a3436dbec57bed323bcc8253ae44e71cb9ceb35eebb07c349c1d81e78a35fa46ed8e630adad198f9661819eb0a5ed1331008", 0x77}], 0x8, &(0x7f0000000940)={0xa0, 0x11d, 0x3, "d4d2dc5db8cac03e5600bff0309416c3e96a3a3864c497e4d1e4baaf2bee2ba3683f1a3de693f8399744b541339a7a0adb8be14d71560d68a5dc33ce413893dad57f269553a63ce32e85bcd3c0e4b3284aa1a93b2804ac198705007ffce33269f70dbfbb51e17fcd11c787c4b23774f9671632bbd366a489d34f3622af59bcd5cbf984878785470b5063ab76f4"}, 0xa0, 0x4000}, {&(0x7f0000000a00)={0x27, 0x0, 0x1, 0x5, 0x81, 0x6, "6061969d2cbffd1b064d06118615912df4e620bbd2d8d86c32235f78c6ee74c32c1d61b27528988b0bf221644b8fcb27bd8eed01318bb0b1aadbdf9cd3c6ae", 0x1b}, 0x60, &(0x7f0000000c40)=[{&(0x7f0000000a80)="3712c79fec43ce4ad70086ea46522b9e7e9cce44ceb712add0e697e09d939ea6140293962e962d402dd5dca4210dc5ef8d289b836fbb65d810820c0c30bbc50cab41272572a0f8ecdccdf6a0682bf90ef3f0888e8899fe0f2736159d4fb61dbf724388dc511df1a5eabc8e74cf91d696651164a1541d8028268ff89988bc71d2d587", 0x82}, {&(0x7f0000000b40)="06609a0e14b99946d6d198862c9eb778708085843d47907f405bb2ab9d0a0b15bc59160029c52aa0d3997b181dd8921a43d44e417aeb2c2e1f191aca210ae1086c5d968518eb11c6e6f6b790f50091a21eed9afba70a0f24a9646e62a6218ff607ab4697d7d88dacb35a3ccb02f4929ebd2c8b351f4d93f896dceac4c39a7be12388a48bc1dac4011600b2487d7b5d8760f155d503bde049fc16b10db83271873b76d728be19d3ad20e64ceafc1e4c64e2f418f1aa0978c2a2f54f24886e8812d2c63fa9a87c722449a7d06a7c75372ee6", 0xd1}], 0x2, &(0x7f0000000c80)={0xd8, 0x0, 0xb9, "5b6ae551c9d0658c165d3fe6b2d6362df3168a81b63dcf8d722e7ebcc5c10979a3bb9203132060263d4ecaf00c4ddf6380911f77b6a777ba96cc15170a2b60021ddd0dc327c1686bcc4d53003f66d4e8acb550e45dc21ab0ca2a20cf7cae8115e652d695b6cd0e8bb2b3f3d1518fc3882013c340c33b0fec3b47e996507365c0fa152aa573e206f86ebb9a9eef084448e3dae4b77d6458c59f52dcc44cb49095c52d4e5c060008310a4c7cd9e46f1960fadc77c1b56488dce011072786c8daaa7044a81c"}, 0xd8, 0x8000}, {&(0x7f0000000d80)={0x27, 0x1, 0x2, 0x3, 0x2b72d14c, 0x2, "54a23ec916d3f7fd6ce3d225caf33ac7c6a0ccdfe3311c627bfd319fe74ba6b476eaf0b4a063c592127c9222b067462aa9fbe5fbb569cd5c8944caaf8c1973", 0x6}, 0x60, &(0x7f0000000fc0)=[{&(0x7f0000000e00)="6c57f913d69b4d7505d521890b54849d1822c2c5230bfbb4ef8ab6dc1dea5dd706bb826b137382efb039c9a7", 0x2c}, {&(0x7f0000000e40)="518e805b01b6358e12236a03d2febb45c6a8146f25c5a6d88474", 0x1a}, {&(0x7f0000000e80)="5e4fd8f4a8321219811c7c121c396a96b02ab0299778ae164d498c13505da034fab8a629836672ec58dc698c23af09029d9d80eb34602a6597a30679fa69673a0e46ce4f99a2c708bfb87cc96b4c8e3242176b37bd94996917d883c11172673a2f85c3d84ef6d8200b5034d148c29808dd1945", 0x73}, {&(0x7f0000000f00)="4b318c038cb04ed921f5875de6a5b73cdec653155c5e8fa4c26c5207a3a42cf0b18d9bfd6dd2d54dce8853bbe0c93bf34b9048d0f7d3b6313e7e5cbc5a96923551764492d35ce59ebb256114bc129f91a0a1e44018", 0x55}, {&(0x7f0000000f80)="bce970d010f1c2d774f8c9b98cc00f596f08a5ed50e9ee63fa681ee9a9afe2c7c34b5d339ea8c3bdfe18c6783e08b5defd07e6", 0x33}], 0x5, &(0x7f0000001040)={0x50, 0x29, 0x3, "0506789f2a06c6928b74482923ac7c7e30fa462ebd71921cf5e4ccaf56b41d75bf05ad8592bdd257f3ae864269065e7f7376869fb86bac0c9ee854"}, 0x50, 0x40}], 0x4, 0x4000) 10:05:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae", 0x8c}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r3, @ANYBLOB="200028bd7000fddbdf250500000008000600070000002c00030008000500e0000001080007004e21000008000400c800000008000500ac14141b4c000300080005007fffffff0800080097000000080005000000000008000300000000000800080005000000080004180fa1f60008000300000000000800010002000000080004002f370000180001000c0007001000000004000000080001000a000000080005002e224850"], 0xb4}}, 0x8000) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="000138a5cb7ec84f5ff8f1629b01226f795aa8cbe0240e789e1a13bf6a59facc6c07ab70ddebe3f33491313a9b331bd3f836ddccb38cd09414a5df9b3bf6b7d3c20ad6026aedc2157611e44c27e187e579f3889ee7b99b28b34a0a7c0f5cb9394eff61897bfcf0466ab6138cb2bb0f927964007088941040cfb840f470cedd3cdd2aecc952e792dfd4780ef20547d9d0997fd1652c5b05c9a43aabf9fd83778543c4fb78892cbdf1682170fc9f7cdc063f8f22a2b5659495036fdc596efc740f3d3297e43bbb3950b82321c027ca6f0d4c9901d7ea8077722c9dd3a02c38fe5d9923b45a7ac181f65893229ff433716f1224c9fcf45278"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000200)=0x1008b0, 0x4) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x7, 0x4000) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 10:05:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000feffff0700", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000012800000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2426.023165] ebt_limit: overflow, try lower: 2147483647/65537 10:05:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce", 0x91}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000a59a7f511e620173a5c7155f258b000000010000000000000008000500ac14140b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000140)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000280)=0x9, 0x4) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000200)={0x3, 0x4}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:05:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000080)={0x2, 0x81}) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x80000000000000, 0xff, @local, 0x80000000}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) r2 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x7, 0x40) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x3c, &(0x7f0000000400)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x1, @loopback, 0x3f}]}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000004c0)={r3, 0x5, 0x20}, &(0x7f0000000500)=0xc) 10:05:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c) [ 2426.150582] XFS (loop0): SB sanity check failed [ 2426.162289] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2426.187645] ebt_limit: overflow, try lower: 2147483647/65537 [ 2426.225181] XFS (loop0): Unmount and run xfs_repair 10:05:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df6", 0x93}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2426.255555] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2426.277667] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2426.304695] 00000000: 58 46 53 42 00 00 10 00 01 28 00 00 00 00 10 00 XFSB.....(...... [ 2426.337359] ebt_limit: overflow, try lower: 2147483647/65537 [ 2426.344293] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:05:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2426.364242] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2426.373694] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:05:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5400000000000000]}}, 0x1c) 10:05:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2426.409575] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2426.454941] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2426.497617] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2426.512677] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2426.526250] ebt_limit: overflow, try lower: 2147483647/65537 [ 2426.530181] XFS (loop0): SB validate failed with error -117. [ 2426.543252] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f00000014c0)="9de62ab7b1d7a58510019bc4353a1b3b3aa42d3e46017c6952b7fc65cb2437db95d0bf998393011ea87d9546b59c5771d8655744484e825e093f48903cfeb09f432f1d9744aa77b24389864ca8e7c8487f99ee2a8aac4a4f1d5c17a6fd4b262c889f8e23c02aededb7eace8e27a92ddb4537335ec9707363df020679c9dc4aa5750407ec6569c4846e061ffcb12119ad6154bb4c5b4affaf81", 0x99}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df6", 0x93}], 0x3, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000006800000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:08 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x1000003, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) [ 2426.714849] ebt_limit: overflow, try lower: 2147483647/65537 [ 2426.741795] ebt_limit: overflow, try lower: 2147483647/65537 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2426.873524] ebt_limit: overflow, try lower: 2147483647/65537 [ 2426.890885] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2426.934266] XFS (loop0): SB sanity check failed [ 2426.938988] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2426.961278] XFS (loop0): Unmount and run xfs_repair [ 2426.975143] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2426.981855] 00000000: 58 46 53 42 00 00 10 00 00 68 00 00 00 00 10 00 XFSB.....h...... [ 2426.994653] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2427.015290] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2427.042686] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2427.062849] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2427.085587] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2427.094457] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2427.102833] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2427.111097] XFS (loop0): SB validate failed with error -117. [ 2427.170820] XFS (loop0): SB sanity check failed [ 2427.176180] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2427.189769] XFS (loop0): Unmount and run xfs_repair [ 2427.195910] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2427.202656] 00000000: 58 46 53 42 00 00 10 00 00 68 00 00 00 00 10 00 XFSB.....h...... [ 2427.210802] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2427.219238] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2427.227439] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2427.235613] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2427.243796] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2427.252212] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2427.260361] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:05:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140)="907c81e6326d28461f52d75dbd61f0e98c2b79d64c0579a079ae928fca56d826e668c81c75175612655e29783b7f654dd103bdc9e45b535c058ff69cb773a62d9ab1ffedfc905c999e6542382bca21c722cd21f6", 0x54, 0x10, &(0x7f00000001c0)={0xa, 0x4e20, 0x3f, @loopback, 0x800}, 0x1c) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) 10:05:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:08 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed1", 0x4a}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) [ 2427.268870] XFS (loop0): SB validate failed with error -117. 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca47", 0x6f}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000580100000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1a", 0x82}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000180)=0x7, 0x56, 0x3) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x101, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4a10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="02002ddf25029000d6c90f000000008f790fdaffff000000000031515aa5597b7c4284cd3850da0300000000000000f37d1e93716009f53b2058aa0458d6b46a38330354c3e0538faa7a5c3c1760de8475b95c"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r4, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) ioctl$TUNSETLINK(r4, 0x400454cd, 0x336) connect$unix(r0, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36", 0x8b}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2427.531894] XFS (loop0): SB sanity check failed [ 2427.537060] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1", 0x90}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2427.586264] XFS (loop0): Unmount and run xfs_repair [ 2427.603014] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2427.617083] 00000000: 58 46 53 42 00 00 10 00 58 01 00 00 00 00 10 00 XFSB....X....... [ 2427.652951] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2427.675343] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2427.688019] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2427.696988] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2427.705974] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2427.716299] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2427.732850] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2427.754317] XFS (loop0): SB validate failed with error -117. 10:05:09 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f00000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="f50000000000fcdbdf25e64116cb8de00d1eda70cd97813b515cd1e3982621156405322a7921c122c457542bacb25d4c2e220000000000000000d88586bd30082d236c68e09b0dfc7d5bace457d6db035ba61295577ffd8454bcdd9fb623b25d0f338952c6ade7d71c3d0265f8e8e91f814443834d4a27"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}}, 0x1c) 10:05:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0d", 0x92}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000003fd0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:09 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="005f3b0000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14000f014c9aaed5256d07cefb473eac96eaa5e5434d2c302f88d13a923b71434bc8b55b0106c2a8850ea511261abf872e0000000000000000"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="200000000000fcdbdfa9b51ad55ed7583bf57f72ee1ec6c71c940b558ca7eb7df3db111b3b0e25c91ffd40cbbc01d155ee48e1d19847ec0bccc7583865b31465501b336d1ac721e86b80b32d5f406e79fda38cf0a2a2db115ca1dedbadad6f9143e22595901c52b1025497defd12e6b52d2598292b06ba8d1bb6ab9425f9f746ac"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)={0x1, 0xfffffffffffffffb, 0x2, 0x4, 0x1, 0x5}) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0xa5}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000540)=0x0) r8 = getuid() r9 = getgid() getpeername$packet(r3, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000009c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="00020000feffffff030000000000000004000000000000000100000000000000ff7f0000000000000101000000000000ff0000000400000005000000000000000600000000000000000000000100000007000000000000000000000000000000ffffff7f000000000600000000000000ffffff7f0600000003000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="ffffff7fef030000000000000300000000000000010000000000000009000000010400002f6465762f6b766d0000000000000000040000000000000003000000000000000000000000000000060000000000000020000000020000000500000000000000090000000000000007000000000000000800000000000000080000000000000008000000000000007bff00000500000005000000ffff000005000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="00000000ffff00000000000006000000000000002bfd00000000000009000000090000002f6465762f6b766d00000000000000000200000000000000000000000000000000040000000000000100000000000000000000003e00000003000000000000004000000000000000060000000000000042e5000000000000010000000000000004000000000000004f000000001000005c0a00000300000008000000", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="00feffff01000000000000000375b057f2000000070000000000000008000000767e00002fd1273a75736572"], 0x200) 10:05:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2915ec4c962d4dfe}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6b24bb11a45d2d31}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x21}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x20000001) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000002c0)=0x7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000003c0)=r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000400)={0xdb, 0x3, 0x0, "4c50f51b0ce57f7e12f9984345ecf7adb5c97ae0f56fc6e2cf3e4714b6745802e332a51c976bd3131b8a89315c45725c01cad9a7e2cc99193fc2194d6f73f52f40cb6d90cc18a600a452d8d8a54f4e3ea5286364f2f914c5644963667ccaa812413cc8d7502007d24e1ec44f675918e10cece2cfe3996d36dc50a47d1e20771a6009fea3325df4dcdffe1c7650a01710c9b633734c472aa2d7bd61d985add508c1c89df729b6d27eaf4e5758abb76f6cbe034d0ddc2159f13e711c32d4ac3348f56851dd5ddc9d10fdd247be072104a191e93eacfdc70dc088b896"}) getsockopt$inet6_int(r5, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df6", 0x93}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2428.275232] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2428.378938] XFS (loop0): SB sanity check failed [ 2428.398795] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2428.416067] XFS (loop0): Unmount and run xfs_repair [ 2428.421536] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}}, 0x1c) 10:05:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2428.428771] 00000000: 58 46 53 42 00 00 10 00 00 00 03 fd 00 00 10 00 XFSB............ [ 2428.438430] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2428.447565] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2428.492493] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2428.524836] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:05:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2428.546275] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2428.560127] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2428.584392] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:05:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2428.593283] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2428.609047] XFS (loop0): SB validate failed with error -117. 10:05:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100003fe00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c) 10:05:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0x9, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x1}}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r1, 0x10, &(0x7f0000000480)={&(0x7f0000000440)=""/5, 0x5, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r1, 0x10, &(0x7f0000000500)={&(0x7f0000000280)=""/43, 0x2b, r4}}, 0x10) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000200)=r5) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 2428.831055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2428.993013] XFS (loop0): SB sanity check failed [ 2428.997770] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2429.009149] XFS (loop0): Unmount and run xfs_repair [ 2429.014299] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2429.020986] 00000000: 58 46 53 42 00 00 10 00 03 fe 00 00 00 00 10 00 XFSB............ [ 2429.029757] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2429.038039] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2429.046253] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2429.054512] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2429.062707] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2429.070855] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2429.079025] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2429.087216] XFS (loop0): SB validate failed with error -117. 10:05:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000100)="23b81c89195300ecc3ccda686d18aa835bda7a0ae3aa18dabc15624b3b9f56bc488ddb3fecc9b01d48085a22f55c37f4941a2018fdd2182e75e7a147989ab5ff45732480c452b4ef77b4d77ef4f8c28d9e6fddf9a9f7e9d03147a1a9f25e9174c0a489a6cefe5dad9040c8a432b8f0d47ee8b23bd516401e6175dfa39cc95ecc3b86a25b8b888c4b506d84e4e33185829323bc2faec942957b68b6dbc5e5329739c77d1ede41c1dcef295c89761fc946161683a2d311dda871590a2550bde8d35da6849adfca8bab8a") connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab2404cd00000000]}}, 0x1c) 10:05:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:admin_passwd_exec_t:s0\x00', 0x29, 0x3) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000000}, 0x2bc, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="544d54000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100003ce00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2429.229597] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed1", 0x4a}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38cb010000000000]}}, 0x1c) 10:05:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca47", 0x6f}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2429.424127] XFS (loop0): SB sanity check failed [ 2429.429175] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2429.465493] XFS (loop0): Unmount and run xfs_repair [ 2429.472618] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2429.496687] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2429.503820] 00000000: 58 46 53 42 00 00 10 00 03 ce 00 00 00 00 10 00 XFSB............ 10:05:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1a", 0x82}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2429.532270] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2429.565784] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2429.603918] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2429.621876] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2429.633269] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2429.641742] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2429.674012] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2429.713464] XFS (loop0): SB validate failed with error -117. [ 2429.801479] XFS (loop0): SB sanity check failed [ 2429.808702] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2429.822513] XFS (loop0): Unmount and run xfs_repair [ 2429.836205] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2429.851469] 00000000: 58 46 53 42 00 00 10 00 03 ce 00 00 00 00 10 00 XFSB............ [ 2429.860010] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2429.868690] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2429.877190] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2429.885695] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2429.894050] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2429.902265] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2429.910407] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2429.918618] XFS (loop0): SB validate failed with error -117. 10:05:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x111000, 0x1c2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000100)={0x0, 0x800, 0x0, 'queue1\x00', 0x9}) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:11 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}}, 0x1c) 10:05:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36", 0x8b}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:11 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x3f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1442dd156a11dd98afe8679c9188a97bbc6258715542cb787011e05f420000000000000007ff000000000300de0006000000000000000000080000000000000008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000140)={0x1, 0x5}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:05:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000500200000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1", 0x90}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2430.106684] ebt_limit_mt_check: 13 callbacks suppressed [ 2430.106694] ebt_limit: overflow, try lower: 2147483647/65537 [ 2430.143868] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2430.240749] XFS (loop0): SB sanity check failed [ 2430.247270] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2430.268361] XFS (loop0): Unmount and run xfs_repair [ 2430.273686] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2430.280700] 00000000: 58 46 53 42 00 00 10 00 50 02 00 00 00 00 10 00 XFSB....P....... 10:05:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1", 0x90}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:11 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c) 10:05:11 executing program 4: r0 = memfd_create(&(0x7f0000000480)='\x00', 0x4) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'team_slave_1\x00'}}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000014dbdf2563559d731f5019123919eb3603430d97560a9d3ba5e03ed43ed5fa64bdced83cd8817433c23244b797fe2061e112bd6883e31ce58c1b88a100b31365f81e6ef8cb6301ae7c64acb42245ecb49072208ea96fcaddc3a6254fc3d64f0cf5e2b21ddf87d2263f557f0af69bcd63ca6c758e0d4d400e2d52c40bdfaea7ccf71ad966a8d886c6e37462d500000000000000098649a99c299fc050827da74ea917bf170c21b1a1a2a1b5dc8cc6ef9ca1b30982cc9911a1c61769583b90dc77e2dc052bf2d77797fc2b7effdd73d17a058b18f6ef63e0cf4101c2abce637b77e6acae39266e7b81a79f543d"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r1, 0x9) pipe(&(0x7f0000000080)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000280)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 2430.283960] ebt_limit: overflow, try lower: 2147483647/65537 [ 2430.299136] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2430.314393] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2430.325364] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2430.348870] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2430.369219] ebt_limit: overflow, try lower: 2147483647/65537 [ 2430.382036] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:05:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2430.402018] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2430.418827] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2430.433087] XFS (loop0): SB validate failed with error -117. [ 2430.463847] ebt_limit: overflow, try lower: 2147483647/65537 10:05:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x1, 0x620000) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0xffffffff, 0x0) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000000180), &(0x7f0000000000)=0xffffffffffffff93) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000100)) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="73796d30002fc7f14a6f4302941bfc3b089c71e8c60fd4b8d0fae94d1a462cc7b0ca9fc1553d099f22be72d647d547a7dd8b333b8b9f56c32e8fff82188cc17c6f338faa6079e91f9ebaefe9ae22e17571c5bb227c6ad40139cb0645079938de68fc03c12e73fa03e33b93a9b6e89ad9dbfe29873db2c21a104b8c99b310566f9716a9485b100db53ed2b64dd15b0aea7e56313ca3a38462d85ebea6d3f0335dde64f026d2ee1e9f5a7d36ef2898ac1e14d45bcdc192cdca510c76089c2027d5234427dd15d322d341b81004afcb3228584551bca03bcce7569b174f702a6c20a73e56f59962f153bdda80cd785d0d93269d62fa29969cd83d13bd7db005d19513edc3d52c990978e42aa3dbb4960508"], &(0x7f0000000200)=""/168, 0xa8) 10:05:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1", 0x90}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000010c0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:12 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x121103, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xaf1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000440)={r6, @in6={{0xa, 0x4e20, 0xfffffffffffffffe, @dev={0xfe, 0x80, [], 0x14}, 0x4}}, 0x4, 0x1}, &(0x7f0000000500)=0x90) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000540)=0x0) sched_setaffinity(r7, 0x8, &(0x7f0000000580)=0x16) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r1, 0x9) pipe(&(0x7f0000000080)) r8 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r9, &(0x7f0000ccb000)={0x2, 0x4000004e20, @loopback}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000000000"], &(0x7f00002bf000)="80", 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r11 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x89e0, &(0x7f00000000c0)={r9, r10}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000100)={r11}) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 10:05:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0d", 0x92}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2431.001604] ebt_limit: overflow, try lower: 2147483647/65537 [ 2431.030531] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:05:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2431.135888] ebt_limit: overflow, try lower: 2147483647/65537 [ 2431.136013] XFS (loop0): SB sanity check failed [ 2431.155469] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2431.168908] XFS (loop0): Unmount and run xfs_repair 10:05:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2431.194896] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2431.220387] 00000000: 58 46 53 42 00 00 10 00 00 00 01 0c 00 00 10 00 XFSB............ 10:05:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff0000]}}, 0x1c) 10:05:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df6", 0x93}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2431.269006] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2431.283920] ebt_limit: overflow, try lower: 2147483647/65537 [ 2431.296391] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2431.327050] ebt_limit: overflow, try lower: 2147483647/65537 [ 2431.327868] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2431.350722] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2431.365058] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:05:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2431.373825] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2431.382792] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2431.391692] XFS (loop0): SB validate failed with error -117. [ 2431.410154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000021400000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff]}}, 0x1c) [ 2431.544667] ebt_limit: overflow, try lower: 2147483647/65537 10:05:12 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f0000000140)=0x20) 10:05:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2431.690171] XFS (loop0): SB sanity check failed [ 2431.704189] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2431.720005] ebt_limit: overflow, try lower: 2147483647/65537 [ 2431.745199] XFS (loop0): Unmount and run xfs_repair [ 2431.765595] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2431.784357] 00000000: 58 46 53 42 00 00 10 00 02 14 00 00 00 00 10 00 XFSB............ [ 2431.803218] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2431.824270] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2431.834819] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2431.843745] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2431.853380] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2431.861726] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2431.870478] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2431.879137] XFS (loop0): SB validate failed with error -117. 10:05:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x3f, @empty, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000000b00000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2432.262907] XFS (loop0): SB sanity check failed [ 2432.267715] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:13 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000440)=""/239) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000400000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2432.328370] XFS (loop0): Unmount and run xfs_repair [ 2432.347271] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2432.372616] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 00 0b XFSB............ [ 2432.405167] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2432.443508] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:13 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38cb0100]}}, 0x1c) 10:05:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000001c0)="e1809ace0143459740b0fa93d8a2add0e09a6671ef05eacd7e5a62a5391a6709a2717c9b676f220deb9dc4df16a390e4c4683ddce724519b4b5d2698bb0cecc30554950dccdc014a3632fc4c63d5baca1ac0e6039df58d028d71bac660b26c6b988855899de7c760c67adba38c78d6d3e575d7d8c4a86514e4a6097bc8c375498334f5a8a6e29a600c465348da43d06c05b88c", 0x93}, {&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1", 0x90}], 0x2, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2432.473184] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2432.495389] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2432.533739] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2432.563244] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100001fa00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2432.584402] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2432.612356] XFS (loop0): SB validate failed with error -117. [ 2432.620601] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) [ 2432.767620] XFS (loop3): SB sanity check failed [ 2432.773275] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2432.824056] XFS (loop3): Unmount and run xfs_repair [ 2432.836520] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2432.858683] 00000000: 58 46 53 42 00 00 10 00 01 fa 00 00 00 00 10 00 XFSB............ [ 2432.875158] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2432.887200] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2432.908319] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2432.917099] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2432.927751] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2432.936657] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2432.945398] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2432.966400] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2432.984721] XFS (loop3): SB validate failed with error -117. 10:05:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010003c0200000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xc363, 0x200000) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000780)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000008c0)=0xe8) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000009c0)={0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0}, &(0x7f0000000a40)=0xc) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)=0x0) sendmsg$netlink(r3, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000001c0)={0x1a8, 0x2d, 0x210, 0x70bd28, 0x25dfdbfe, "", [@nested={0xf0, 0x76, [@generic="2094cfca353cab91aba730f8d43e86523df1341bdda06d561bb288b058375ebdc1e31265eaf03866682358ba51b7510bc572933e83bf63cc662b12cb7e3d146df412cfb93cfd58a0375bd771ed1954c456285f014e1071f635a79f8348d90515921e294a2c3f7afbf35660f93fe76ea7248d996ea2bfb080c58ec7474525c6519890c65677d24e21682269a7a982b4660bd66ac192d4bf41bfb2176b69b700fb7d98f56b9a3a05dfa54499147301c11b067582223c29", @generic="f6d2905933ac20dc092b03de82f3e63ddd30fa30b9a80c4ad0ed258fa7b6c1b09110563ca7cc9122533db83162638c8e1ec994"]}, @typed={0x8, 0x5b, @uid=r4}, @generic="a4d33d8e4debf82ad6a01ab45ac41831a393fa52649cda8ed7382fad252c10d4755bd75c7fb45ea7c42d922b7e53b0dcb6f7664103894b2ede95de2f209895677f3ccf687b315d3a23c48ed10e2fdeb60fd715a81161c8f8192b6f495db919b2bf28903e6e92b433aae63cff3f28ba018740fdf7acf827f60c2caa43d4bd971253cd628b355c7fd028", @generic="26bffd87c816f7e85b8daca711", @typed={0x8, 0x84, @ipv4=@rand_addr=0x101}]}, 0x1a8}, {&(0x7f0000000380)={0x1b8, 0x19, 0x10, 0x70bd2d, 0x25dfdbfb, "", [@generic="10919bf884163997b037b9be4f9f19e8f1595abbdf544cf1eb9dfb1fc1fa90c78ccb98cea158feedf5a684462bb66f0220f5b2241eb80f008da0deee3a36fa56e09e778968e4b5b82e06b56696807c166bcc49b20c398251feb8f049897f7f45d8a480c0a90fdf33ebfa4f27db14c837cdbb887ed7e28186043b7a1a68d19f3b4723bdd53f74b81db1edc0b85f56bb89a8239c7aaf65ddfa13f3ba69c04f425a9c379f7ead3b92d4f7532c7facf0f7430d6a08a3fde3518da5f1c0a7661a05b278ae5d386fb668fc1bd1", @generic="b74727fe0d3d99271ff6783a8420b72e4433ff9ac0657d782bac0fad6d22428258a8e93342bc570f51931be61106d77718ff18f1c4349283ea047478feef23b716ab25103658ec9114dd900f8286da277208c192740dc0c6b6bf0d84c05c3cdf7311fb3143cc934b394e6a882fab64ec6f4f847622b7ce2b943b323cb7d7032230088baf134a97667210b896b1fa9ca373b17647257455fcdd26a8e1a56fb2f91b8fd581807112e3fd4c97654e5edbb6fadd5c46d5845d268c309a62a0f54f49219f0dfcc884af6b", @typed={0x14, 0x38, @ipv6=@dev={0xfe, 0x80, [], 0x13}}]}, 0x1b8}, {&(0x7f0000000540)={0x74, 0x15, 0x618, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x3b, @u32}, @generic="15fa15824bc29b0ea756fdac881299c9c88f0d2c18c630afda31455fced6fe", @generic="0ddc941a7ebc97380c94a3270efd837040f5241e6f", @typed={0xc, 0x37, @u64=0x4}, @typed={0xc, 0x5, @u64=0x20}, @typed={0x10, 0x4e, @str='Eusereth1\x00'}]}, 0x74}, {&(0x7f00000005c0)={0x164, 0x2b, 0xc, 0x70bd2d, 0x25dfdbfc, "", [@generic="ae9f09c0f0506f4a3cbd5ca2cfa1e054aa49cf1145dcc530ac89e31ca1194f126be1eb423dea95899125fdfe52f9faa216358cbe3a418e2f85447780ab7351ed94203e074977ebc1cf8261bab2a8fa4a8a57c57cc78ef0788c4da20375b295115b830d3760997b059dc7981d5a90bad516a4d8986abfb7c1d3492aad574ee4cc011125fdbd3c100075d183bda5e73c4a74845110a0437b5a180aeaaa64b844ddeb6d063db2fa56aa51a9581b469dbd7ca0e9c6b18664cf74188923b9a38257df2dce3d9ce77fdf29329f3b94898b", @generic="09c84ce879dda8b26ab3b97137c80d3dbae2c38ae1139065ee2e91bd6fcbd0509039da31fc3a2c86022412f17ef404ff3da5e1796101617693260c4e75379de28b2f1943762a96bc457eee17dd62a60a695653d2a218a5a3be8514606dad9b4cba4c7371e94e81f8e1aa73200ac725365168c9751245b1608ed02794f60bb85fa4d8d5b8"]}, 0x164}], 0x4, &(0x7f0000000b40)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x30, 0x1, 0x1, [r1, r2, r2, r0, r0, r0, r0, r2]}], 0x70, 0x4010}, 0x40000c0) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00]}}, 0x1c) [ 2433.165965] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2433.276653] XFS (loop0): SB sanity check failed [ 2433.281694] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2433.301532] XFS (loop0): Unmount and run xfs_repair [ 2433.307171] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2433.314142] 00000000: 58 46 53 42 00 00 10 00 3c 02 00 00 00 00 10 00 XFSB....<....... [ 2433.326918] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2433.335563] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2433.344752] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2433.352966] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2433.352979] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 10:05:14 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) ioctl$TIOCCBRK(r1, 0x5428) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x8) 10:05:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/191, 0xbf) pause() 10:05:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc4]}}, 0x1c) [ 2433.352991] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2433.353002] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2433.353038] XFS (loop0): SB validate failed with error -117. 10:05:14 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000c40000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2433.553784] FAULT_INJECTION: forcing a failure. [ 2433.553784] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.582399] CPU: 0 PID: 1594 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #341 [ 2433.589708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2433.599062] Call Trace: [ 2433.601676] dump_stack+0x244/0x39d [ 2433.605319] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2433.610527] should_fail.cold.4+0xa/0x17 [ 2433.614681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2433.619782] ? zap_class+0x640/0x640 [ 2433.623483] ? print_usage_bug+0xc0/0xc0 [ 2433.627540] ? find_held_lock+0x36/0x1c0 [ 2433.631591] ? __lock_is_held+0xb5/0x140 [ 2433.635635] ? fuse_dev_ioctl+0x88/0x430 [ 2433.639689] ? perf_trace_sched_process_exec+0x860/0x860 [ 2433.645124] ? print_usage_bug+0xc0/0xc0 [ 2433.649178] __should_failslab+0x124/0x180 [ 2433.653417] should_failslab+0x9/0x14 [ 2433.657234] __kmalloc+0x2e0/0x760 [ 2433.660766] ? sock_kmalloc+0x15a/0x1f0 [ 2433.664725] sock_kmalloc+0x15a/0x1f0 [ 2433.668510] ? __sk_mem_schedule+0xe0/0xe0 [ 2433.672730] ? trace_hardirqs_on+0xbd/0x310 [ 2433.677036] ? lock_release+0xa00/0xa00 [ 2433.680996] ? lock_sock_nested+0xe2/0x120 [ 2433.685239] ? trace_hardirqs_off_caller+0x310/0x310 [ 2433.690348] af_alg_alloc_areq+0x83/0x280 [ 2433.694497] ? alg_accept+0x60/0x60 [ 2433.698116] ? __local_bh_enable_ip+0x160/0x260 [ 2433.702777] skcipher_recvmsg+0x354/0x1780 [ 2433.707008] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2433.711838] ? apparmor_socket_recvmsg+0x29/0x30 [ 2433.716578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2433.722099] ? security_socket_recvmsg+0x9c/0xc0 [ 2433.726841] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2433.731672] sock_recvmsg+0xd0/0x110 [ 2433.735371] ? __sock_recv_ts_and_drops+0x420/0x420 [ 2433.740488] ___sys_recvmsg+0x2b6/0x680 [ 2433.744452] ? ___sys_sendmsg+0x930/0x930 [ 2433.748597] ? lock_downgrade+0x900/0x900 [ 2433.752729] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2433.758254] ? proc_fail_nth_write+0x9e/0x210 [ 2433.762748] ? __fget_light+0x2e9/0x430 [ 2433.766702] ? fget_raw+0x20/0x20 [ 2433.770154] ? find_held_lock+0x36/0x1c0 [ 2433.774229] ? kasan_check_write+0x14/0x20 [ 2433.778454] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2433.783379] ? wait_for_completion+0x8a0/0x8a0 [ 2433.787956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2433.793485] ? sockfd_lookup_light+0xc5/0x160 [ 2433.797967] __sys_recvmsg+0x11a/0x280 [ 2433.801842] ? __ia32_sys_sendmmsg+0x100/0x100 [ 2433.806412] ? __sb_end_write+0xd9/0x110 [ 2433.810465] ? fput+0x130/0x1a0 [ 2433.813740] ? do_syscall_64+0x9a/0x820 [ 2433.817703] ? do_syscall_64+0x9a/0x820 [ 2433.821668] ? trace_hardirqs_off_caller+0x310/0x310 [ 2433.826759] __x64_sys_recvmsg+0x78/0xb0 [ 2433.830807] do_syscall_64+0x1b9/0x820 [ 2433.834679] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2433.840026] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2433.844945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2433.849778] ? trace_hardirqs_on_caller+0x310/0x310 [ 2433.854782] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2433.859805] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2433.864812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2433.869651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2433.874821] RIP: 0033:0x457569 [ 2433.878000] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2433.896881] RSP: 002b:00007fe53d1c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 10:05:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2433.904575] RAX: ffffffffffffffda RBX: 00007fe53d1c5c90 RCX: 0000000000457569 [ 2433.911829] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000004 [ 2433.919081] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2433.926334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe53d1c66d4 [ 2433.933587] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000005 10:05:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:15 executing program 3 (fault-call:5 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2434.146070] FAULT_INJECTION: forcing a failure. [ 2434.146070] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.158146] CPU: 1 PID: 1624 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #341 [ 2434.159029] XFS (loop0): SB sanity check failed [ 2434.165444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2434.165453] Call Trace: [ 2434.165482] dump_stack+0x244/0x39d [ 2434.165512] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2434.165531] ? trace_hardirqs_on+0xbd/0x310 [ 2434.165551] ? kasan_check_read+0x11/0x20 [ 2434.165570] ? iov_iter_get_pages+0x2fa/0x12a0 [ 2434.165591] should_fail.cold.4+0xa/0x17 [ 2434.165610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2434.165626] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2434.165644] ? get_user_pages_fast+0x2a9/0x450 [ 2434.174236] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2434.179669] ? __get_user_pages_fast+0x3f0/0x3f0 [ 2434.179689] ? __kernel_text_address+0xd/0x40 [ 2434.179709] ? unwind_get_return_address+0x61/0xa0 [ 2434.183964] XFS (loop0): Unmount and run xfs_repair [ 2434.185893] ? zap_class+0x640/0x640 [ 2434.185912] ? __save_stack_trace+0x8d/0xf0 [ 2434.185932] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2434.185954] ? find_held_lock+0x36/0x1c0 [ 2434.191221] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2434.195422] ? __lock_is_held+0xb5/0x140 [ 2434.195451] ? perf_trace_sched_process_exec+0x860/0x860 [ 2434.195466] ? find_held_lock+0x36/0x1c0 [ 2434.195489] __should_failslab+0x124/0x180 [ 2434.195514] should_failslab+0x9/0x14 [ 2434.199742] 00000000: 58 46 53 42 00 00 10 00 c4 00 00 00 00 00 10 00 XFSB............ [ 2434.204205] __kmalloc+0x2e0/0x760 [ 2434.204223] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2434.204242] ? iov_iter_advance+0x306/0x13f0 [ 2434.204256] ? sg_init_table+0x28/0x60 [ 2434.204270] ? sock_kmalloc+0x15a/0x1f0 [ 2434.204281] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2434.204296] sock_kmalloc+0x15a/0x1f0 [ 2434.204311] ? __sk_mem_schedule+0xe0/0xe0 [ 2434.209186] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2434.213442] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2434.213465] af_alg_get_rsgl+0x1d7/0x920 [ 2434.213493] ? af_alg_make_sg+0x550/0x550 [ 2434.213505] ? lock_sock_nested+0xe2/0x120 [ 2434.213525] ? trace_hardirqs_off_caller+0x310/0x310 [ 2434.218612] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2434.218623] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2434.218630] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2434.218642] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2434.218649] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2434.218663] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2434.218707] XFS (loop0): SB validate failed with error -117. [ 2434.307300] ? af_alg_alloc_areq+0x1ec/0x280 [ 2434.307312] ? alg_accept+0x60/0x60 [ 2434.307332] ? __local_bh_enable_ip+0x160/0x260 [ 2434.315861] skcipher_recvmsg+0x3a2/0x1780 [ 2434.315887] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2434.336883] ? apparmor_socket_recvmsg+0x29/0x30 [ 2434.336902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2434.336922] ? security_socket_recvmsg+0x9c/0xc0 [ 2434.349249] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2434.349268] sock_recvmsg+0xd0/0x110 [ 2434.349283] ? __sock_recv_ts_and_drops+0x420/0x420 [ 2434.349298] ___sys_recvmsg+0x2b6/0x680 [ 2434.349319] ? ___sys_sendmsg+0x930/0x930 [ 2434.349339] ? lock_downgrade+0x900/0x900 [ 2434.379947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2434.379967] ? proc_fail_nth_write+0x9e/0x210 [ 2434.379987] ? __fget_light+0x2e9/0x430 [ 2434.380001] ? fget_raw+0x20/0x20 [ 2434.380018] ? find_held_lock+0x36/0x1c0 [ 2434.396297] ? kasan_check_write+0x14/0x20 [ 2434.396315] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2434.396345] ? wait_for_completion+0x8a0/0x8a0 [ 2434.396370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2434.529687] ? sockfd_lookup_light+0xc5/0x160 [ 2434.534192] __sys_recvmsg+0x11a/0x280 [ 2434.538071] ? __ia32_sys_sendmmsg+0x100/0x100 [ 2434.542646] ? __sb_end_write+0xd9/0x110 [ 2434.546698] ? fput+0x130/0x1a0 [ 2434.549980] ? do_syscall_64+0x9a/0x820 [ 2434.553936] ? do_syscall_64+0x9a/0x820 [ 2434.557905] ? trace_hardirqs_off_caller+0x310/0x310 [ 2434.564480] __x64_sys_recvmsg+0x78/0xb0 [ 2434.568525] do_syscall_64+0x1b9/0x820 [ 2434.572400] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2434.577765] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2434.582681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2434.588043] ? trace_hardirqs_on_caller+0x310/0x310 [ 2434.593060] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2434.598060] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2434.603162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2434.607997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2434.613169] RIP: 0033:0x457569 [ 2434.616353] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2434.635240] RSP: 002b:00007fe53d1c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 10:05:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2434.642931] RAX: ffffffffffffffda RBX: 00007fe53d1c5c90 RCX: 0000000000457569 [ 2434.650182] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000004 [ 2434.657435] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2434.664687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe53d1c66d4 [ 2434.671941] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000005 10:05:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000200)=@req={0x28, &(0x7f0000000140)={'ip6gre0\x00', @ifru_flags=0x8000}}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:16 executing program 3 (fault-call:5 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10001, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000080)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0xe474d07494af4e42, &(0x7f0000000180), &(0x7f0000000140)=0x4) 10:05:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c) 10:05:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000480000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2434.864992] FAULT_INJECTION: forcing a failure. [ 2434.864992] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.883823] CPU: 1 PID: 1648 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #341 [ 2434.891163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2434.900529] Call Trace: [ 2434.903129] dump_stack+0x244/0x39d [ 2434.906758] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2434.911949] ? trace_hardirqs_on+0xbd/0x310 [ 2434.916273] ? iov_iter_get_pages+0x2fa/0x12a0 [ 2434.920848] should_fail.cold.4+0xa/0x17 [ 2434.924904] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2434.930002] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2434.935013] ? get_user_pages_fast+0x2a9/0x450 [ 2434.939589] ? __get_user_pages_fast+0x3f0/0x3f0 [ 2434.944331] ? kasan_kmalloc+0xc7/0xe0 [ 2434.948204] ? sock_kmalloc+0x15a/0x1f0 [ 2434.952170] ? af_alg_get_rsgl+0x1d7/0x920 [ 2434.956398] ? zap_class+0x640/0x640 [ 2434.960103] ? __sys_recvmsg+0x11a/0x280 [ 2434.964159] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2434.969161] ? find_held_lock+0x36/0x1c0 [ 2434.973213] ? __lock_is_held+0xb5/0x140 [ 2434.977374] ? perf_trace_sched_process_exec+0x860/0x860 [ 2434.982820] __should_failslab+0x124/0x180 [ 2434.987044] should_failslab+0x9/0x14 [ 2434.990831] __kmalloc+0x2e0/0x760 [ 2434.994370] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2434.999376] ? iov_iter_advance+0x306/0x13f0 [ 2435.003784] ? sg_init_table+0x28/0x60 [ 2435.007746] ? sock_kmalloc+0x15a/0x1f0 [ 2435.011705] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2435.016712] sock_kmalloc+0x15a/0x1f0 [ 2435.020503] ? __sk_mem_schedule+0xe0/0xe0 [ 2435.024727] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2435.029735] af_alg_get_rsgl+0x1d7/0x920 [ 2435.033789] ? af_alg_make_sg+0x550/0x550 [ 2435.037922] ? lock_sock_nested+0xe2/0x120 [ 2435.042144] ? trace_hardirqs_off_caller+0x310/0x310 [ 2435.047241] ? af_alg_alloc_areq+0x1ec/0x280 [ 2435.051636] ? alg_accept+0x60/0x60 [ 2435.055253] ? __local_bh_enable_ip+0x160/0x260 [ 2435.059912] skcipher_recvmsg+0x3a2/0x1780 [ 2435.064157] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2435.068988] ? apparmor_socket_recvmsg+0x29/0x30 [ 2435.073733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.079264] ? security_socket_recvmsg+0x9c/0xc0 [ 2435.084007] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2435.088838] sock_recvmsg+0xd0/0x110 [ 2435.092540] ? __sock_recv_ts_and_drops+0x420/0x420 [ 2435.097542] ___sys_recvmsg+0x2b6/0x680 [ 2435.101509] ? ___sys_sendmsg+0x930/0x930 [ 2435.105732] ? lock_downgrade+0x900/0x900 [ 2435.109876] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2435.115403] ? proc_fail_nth_write+0x9e/0x210 [ 2435.119910] ? __fget_light+0x2e9/0x430 [ 2435.123875] ? fget_raw+0x20/0x20 [ 2435.127314] ? find_held_lock+0x36/0x1c0 [ 2435.131367] ? kasan_check_write+0x14/0x20 [ 2435.135593] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2435.140509] ? wait_for_completion+0x8a0/0x8a0 [ 2435.145083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2435.150612] ? sockfd_lookup_light+0xc5/0x160 [ 2435.155100] __sys_recvmsg+0x11a/0x280 [ 2435.158974] ? __ia32_sys_sendmmsg+0x100/0x100 [ 2435.163548] ? __sb_end_write+0xd9/0x110 [ 2435.167596] ? fput+0x130/0x1a0 [ 2435.170868] ? do_syscall_64+0x9a/0x820 [ 2435.174829] ? do_syscall_64+0x9a/0x820 [ 2435.178802] ? trace_hardirqs_off_caller+0x310/0x310 [ 2435.183895] __x64_sys_recvmsg+0x78/0xb0 [ 2435.187944] do_syscall_64+0x1b9/0x820 [ 2435.191828] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2435.197192] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2435.202113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2435.206946] ? trace_hardirqs_on_caller+0x310/0x310 [ 2435.211962] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2435.217057] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2435.222071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2435.226915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.232102] RIP: 0033:0x457569 [ 2435.235289] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2435.254178] RSP: 002b:00007fe53d1c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 10:05:16 executing program 3 (fault-call:5 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2435.261874] RAX: ffffffffffffffda RBX: 00007fe53d1c5c90 RCX: 0000000000457569 [ 2435.269128] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000004 [ 2435.276383] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2435.283641] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe53d1c66d4 [ 2435.290901] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000005 [ 2435.299717] ebt_limit_mt_check: 12 callbacks suppressed [ 2435.299726] ebt_limit: overflow, try lower: 2147483647/65537 10:05:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2435.393306] FAULT_INJECTION: forcing a failure. [ 2435.393306] name failslab, interval 1, probability 0, space 0, times 0 [ 2435.435163] CPU: 0 PID: 1665 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #341 [ 2435.442499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.451863] Call Trace: [ 2435.454474] dump_stack+0x244/0x39d [ 2435.455866] ebt_limit: overflow, try lower: 2147483647/65537 [ 2435.458140] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2435.458166] ? trace_hardirqs_on+0xbd/0x310 [ 2435.458188] ? iov_iter_get_pages+0x2fa/0x12a0 [ 2435.458210] should_fail.cold.4+0xa/0x17 10:05:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2435.482131] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2435.487254] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2435.492285] ? get_user_pages_fast+0x2a9/0x450 [ 2435.496896] ? __get_user_pages_fast+0x3f0/0x3f0 [ 2435.501660] ? kasan_kmalloc+0xc7/0xe0 [ 2435.505552] ? sock_kmalloc+0x15a/0x1f0 [ 2435.509608] ? af_alg_get_rsgl+0x1d7/0x920 [ 2435.509626] ? zap_class+0x640/0x640 [ 2435.517561] ? __sys_recvmsg+0x11a/0x280 [ 2435.521631] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2435.526662] ? find_held_lock+0x36/0x1c0 [ 2435.530736] ? __lock_is_held+0xb5/0x140 10:05:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2435.534821] ? perf_trace_sched_process_exec+0x860/0x860 [ 2435.537602] ebt_limit: overflow, try lower: 2147483647/65537 [ 2435.540292] __should_failslab+0x124/0x180 [ 2435.540316] should_failslab+0x9/0x14 [ 2435.540338] __kmalloc+0x2e0/0x760 [ 2435.540355] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2435.540376] ? iov_iter_advance+0x306/0x13f0 [ 2435.567220] ? sg_init_table+0x28/0x60 [ 2435.571111] ? sock_kmalloc+0x15a/0x1f0 [ 2435.575102] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2435.580131] sock_kmalloc+0x15a/0x1f0 [ 2435.583937] ? __sk_mem_schedule+0xe0/0xe0 [ 2435.583962] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2435.583981] af_alg_get_rsgl+0x1d7/0x920 [ 2435.593740] ? af_alg_make_sg+0x550/0x550 [ 2435.593754] ? lock_sock_nested+0xe2/0x120 [ 2435.593774] ? trace_hardirqs_off_caller+0x310/0x310 [ 2435.593794] ? af_alg_alloc_areq+0x1ec/0x280 [ 2435.593810] ? alg_accept+0x60/0x60 [ 2435.614691] ebt_limit: overflow, try lower: 2147483647/65537 [ 2435.615692] ? __local_bh_enable_ip+0x160/0x260 [ 2435.615718] skcipher_recvmsg+0x3a2/0x1780 10:05:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2435.615745] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2435.615758] ? apparmor_socket_recvmsg+0x29/0x30 [ 2435.615778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.649145] ? security_socket_recvmsg+0x9c/0xc0 [ 2435.653921] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2435.658783] sock_recvmsg+0xd0/0x110 [ 2435.662524] ? __sock_recv_ts_and_drops+0x420/0x420 [ 2435.667550] ___sys_recvmsg+0x2b6/0x680 [ 2435.671542] ? ___sys_sendmsg+0x930/0x930 [ 2435.675701] ? lock_downgrade+0x900/0x900 [ 2435.679874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2435.685417] ? proc_fail_nth_write+0x9e/0x210 [ 2435.689939] ? __fget_light+0x2e9/0x430 [ 2435.692692] ebt_limit: overflow, try lower: 2147483647/65537 [ 2435.693921] ? fget_raw+0x20/0x20 [ 2435.693940] ? find_held_lock+0x36/0x1c0 [ 2435.693965] ? kasan_check_write+0x14/0x20 [ 2435.693982] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2435.694001] ? wait_for_completion+0x8a0/0x8a0 [ 2435.721025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2435.726587] ? sockfd_lookup_light+0xc5/0x160 [ 2435.731104] __sys_recvmsg+0x11a/0x280 10:05:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2435.735002] ? __ia32_sys_sendmmsg+0x100/0x100 [ 2435.739622] ? __sb_end_write+0xd9/0x110 [ 2435.743694] ? fput+0x130/0x1a0 [ 2435.746983] ? do_syscall_64+0x9a/0x820 [ 2435.747000] ? do_syscall_64+0x9a/0x820 [ 2435.747027] ? trace_hardirqs_off_caller+0x310/0x310 [ 2435.747057] __x64_sys_recvmsg+0x78/0xb0 [ 2435.754987] do_syscall_64+0x1b9/0x820 [ 2435.755005] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2435.755021] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2435.755038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2435.783154] ? trace_hardirqs_on_caller+0x310/0x310 [ 2435.788188] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2435.793221] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2435.798254] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2435.799770] ebt_limit: overflow, try lower: 2147483647/65537 [ 2435.803113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.803127] RIP: 0033:0x457569 [ 2435.803144] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2435.803154] RSP: 002b:00007fe53d1c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2435.803168] RAX: ffffffffffffffda RBX: 00007fe53d1c5c90 RCX: 0000000000457569 [ 2435.803177] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000004 [ 2435.803190] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2435.865664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe53d1c66d4 [ 2435.872919] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000005 10:05:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0, &(0x7f0000000280)={0x4, 0x7, 0xffffffffffffffff, 0x2, 0x5, 0x100000001, 0xffff, 0x100400}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000140)={@multicast1, @broadcast}, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000440)={"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"}) connect$rds(r5, &(0x7f0000000880)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vga_arbiter\x00', 0x101201, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 10:05:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000000400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14280000000000]}}, 0x1c) 10:05:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2435.963491] ebt_limit: overflow, try lower: 2147483647/65537 [ 2435.992817] XFS (loop0): SB sanity check failed [ 2435.997786] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2436.050161] XFS (loop0): Unmount and run xfs_repair [ 2436.067944] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2436.081503] ebt_limit: overflow, try lower: 2147483647/65537 [ 2436.096947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2436.113994] 00000000: 58 46 53 42 00 00 10 00 00 00 00 48 00 00 10 00 XFSB.......H.... [ 2436.134010] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2436.143510] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2436.153331] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2436.161632] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2436.169982] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2436.183159] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2436.194125] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2436.206069] XFS (loop0): SB validate failed with error -117. 10:05:17 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000001580000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:17 executing program 3 (fault-call:5 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) 10:05:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[@ANYBLOB="145f420000000000000007ff000000006c860300def8afba95b8c5cec527561142bcee05000600000000000000000008000000000000000800"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2436.315934] ebt_limit: overflow, try lower: 2147483647/65537 [ 2436.333269] FAULT_INJECTION: forcing a failure. [ 2436.333269] name failslab, interval 1, probability 0, space 0, times 0 [ 2436.365028] CPU: 1 PID: 1732 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #341 [ 2436.369825] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2436.372342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2436.372349] Call Trace: [ 2436.372377] dump_stack+0x244/0x39d [ 2436.372402] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2436.372434] should_fail.cold.4+0xa/0x17 [ 2436.372454] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2436.412566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2436.418203] ? check_preemption_disabled+0x48/0x280 [ 2436.423479] ? zap_class+0x640/0x640 [ 2436.427184] ? find_held_lock+0x36/0x1c0 [ 2436.431233] ? __lock_is_held+0xb5/0x140 [ 2436.435280] ? setkey+0x148/0x2b0 [ 2436.438748] ? perf_trace_sched_process_exec+0x860/0x860 [ 2436.444192] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2436.449206] __should_failslab+0x124/0x180 [ 2436.453519] should_failslab+0x9/0x14 [ 2436.457307] __kmalloc+0x2e0/0x760 [ 2436.460837] ? af_alg_make_sg+0x550/0x550 [ 2436.464981] ? sock_kmalloc+0x15a/0x1f0 [ 2436.468951] sock_kmalloc+0x15a/0x1f0 [ 2436.472738] ? __sk_mem_schedule+0xe0/0xe0 [ 2436.476967] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2436.481972] ? af_alg_count_tsgl+0x1bc/0x250 [ 2436.486374] skcipher_recvmsg+0x505/0x1780 [ 2436.490601] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2436.495429] ? apparmor_socket_recvmsg+0x29/0x30 [ 2436.500172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2436.505698] ? security_socket_recvmsg+0x9c/0xc0 [ 2436.510440] ? skcipher_sendmsg_nokey+0x140/0x140 [ 2436.515275] sock_recvmsg+0xd0/0x110 [ 2436.518977] ? __sock_recv_ts_and_drops+0x420/0x420 [ 2436.523992] ___sys_recvmsg+0x2b6/0x680 [ 2436.527962] ? ___sys_sendmsg+0x930/0x930 [ 2436.532103] ? lock_downgrade+0x900/0x900 [ 2436.536431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2436.541967] ? proc_fail_nth_write+0x9e/0x210 [ 2436.546455] ? __fget_light+0x2e9/0x430 [ 2436.550418] ? fget_raw+0x20/0x20 [ 2436.553858] ? find_held_lock+0x36/0x1c0 [ 2436.557907] ? kasan_check_write+0x14/0x20 [ 2436.562129] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2436.567049] ? wait_for_completion+0x8a0/0x8a0 [ 2436.571633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2436.577161] ? sockfd_lookup_light+0xc5/0x160 [ 2436.581645] __sys_recvmsg+0x11a/0x280 [ 2436.585519] ? __ia32_sys_sendmmsg+0x100/0x100 [ 2436.590459] ? __sb_end_write+0xd9/0x110 [ 2436.594511] ? fput+0x130/0x1a0 [ 2436.597777] ? do_syscall_64+0x9a/0x820 [ 2436.601737] ? do_syscall_64+0x9a/0x820 [ 2436.605705] ? trace_hardirqs_off_caller+0x310/0x310 [ 2436.610801] __x64_sys_recvmsg+0x78/0xb0 [ 2436.615200] do_syscall_64+0x1b9/0x820 [ 2436.619080] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2436.624430] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2436.629345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2436.634175] ? trace_hardirqs_on_caller+0x310/0x310 [ 2436.639178] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2436.644183] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2436.649190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2436.654029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.659204] RIP: 0033:0x457569 [ 2436.662402] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2436.681289] RSP: 002b:00007fe53d1c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2436.688989] RAX: ffffffffffffffda RBX: 00007fe53d1c5c90 RCX: 0000000000457569 [ 2436.696248] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000004 [ 2436.703503] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:05:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2436.710761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe53d1c66d4 [ 2436.718019] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000005 10:05:18 executing program 3 (fault-call:5 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:18 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x1c) [ 2436.774727] XFS (loop0): SB sanity check failed [ 2436.779491] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2436.806004] ebt_limit: overflow, try lower: 2147483647/65537 10:05:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x8000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000100)="82e767ec737738c53ed2f8315af9ea585c1b470757fd7975d8ec810416ed05797bc78f94455af2039ac7c9926f91e19d5f6eaa5b98ad7e6b8b012ec268836f5a7da806dc", &(0x7f0000000180)="50ce14dc606bc46e34ea0be2201ca3bea2f11019e884a5cc82c906a038c38e2b1502abfd11c20d775bf5048914c6a704c76e936f0e0137935694dadd5bb0226afa84c47fd110", 0x1}, 0x20) [ 2436.861361] XFS (loop0): Unmount and run xfs_repair 10:05:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000980100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2436.895257] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2436.932419] 00000000: 58 46 53 42 00 00 10 00 00 00 01 58 00 00 10 00 XFSB.......X.... 10:05:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[@ANYBLOB="205f420000000000000007ff000000000300de0006000000000500ac14141b080003000100009078dc122d42a1"], 0x1}}, 0x0) write$binfmt_elf32(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x452) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) r4 = getpgrp(0x0) ptrace$setregs(0xf, r4, 0x20, &(0x7f0000000200)="adc28c8e3c7a3d3e04d7325d8f5e90594f1d5e389158c69e611efdc81987d941") syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x3fd7, 0x101002) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) ioctl$NBD_DISCONNECT(r1, 0xab08) pipe(&(0x7f0000000080)) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000440)={{0x3, @addr=0x1ff}, "d824d588b345f82dba4eb8ccc7cc6a55cc555e5d04a2972916e71f67212ec14b", 0x2}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 2436.946338] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2436.974448] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2436.990460] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2437.017615] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2437.027381] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2437.054605] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2437.074074] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2437.095585] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2437.127201] XFS (loop0): SB validate failed with error -117. 10:05:18 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000660000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0xb7a}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000380)=@assoc_value, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x12}}}, 0x1, 0x100, 0xed, 0x9, 0x96}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000540)=@assoc_value={r2, 0x1}, &(0x7f0000000140)=0x9b) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, &(0x7f0000000240)=0x8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x80080, 0x0) ioctl$NBD_CLEAR_QUE(r3, 0xab05) clock_gettime(0x0, &(0x7f0000000080)) clock_nanosleep(0x6, 0x1, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000180)) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:18 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) 10:05:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x5) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0x10, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2437.285051] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:18 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) [ 2437.383737] XFS (loop0): SB sanity check failed [ 2437.388819] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2437.402404] XFS (loop0): Unmount and run xfs_repair [ 2437.409492] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2437.451174] 00000000: 58 46 53 42 00 00 10 00 66 00 00 00 00 00 10 00 XFSB....f....... [ 2437.505314] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2437.520925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2437.549569] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2437.567091] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2437.593365] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2437.627063] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2437.664596] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2437.678119] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2437.700095] XFS (loop0): SB validate failed with error -117. 10:05:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r3 = socket$nl_crypto(0x10, 0x3, 0x15) r4 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0xfffffffffffffffc, 0x40) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000280)) r5 = socket(0x11, 0x2, 0x100) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'dummy0\x00', 0x0}) getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000000400)={@dev, 0x0}, &(0x7f0000000440)=0x14) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000500)={@loopback, 0x0}, &(0x7f0000000540)=0x14) getsockname$packet(r3, &(0x7f0000000580)={0x11, 0x0, 0x0}, &(0x7f00000005c0)=0x14) r14 = accept$packet(0xffffffffffffff9c, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001d40)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001e40)=0xe8) recvmsg(r0, &(0x7f0000002200)={&(0x7f0000001e80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f00)=""/210, 0xd2}, {&(0x7f0000002000)=""/216, 0xd8}, {&(0x7f0000002100)=""/140, 0x8c}], 0x3, 0x0, 0x0, 0x1}, 0x40002162) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f0000002600)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000025c0)={&(0x7f0000002280)={0x340, r6, 0x0, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r7}, {0x2a0, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x6, 0x10001, 0x3, 0x9}, {0x521e, 0x3, 0x7ff}, {0x1ff, 0x6, 0x0, 0x8}, {0x800000000, 0x6, 0xb7a, 0x7fff}, {0xffff, 0xfffffffffffffff9, 0x1bb8, 0x7f}, {0x9e7, 0xa0, 0x2, 0x5000}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6a}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4, 0x2, 0x3d, 0x101}, {0x4, 0x100000001, 0xffffffff, 0x80}, {0x80, 0xfffffffffffffffe, 0x1, 0x4}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x808000000000000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x800000}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r15}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}]}, 0x340}, 0x1, 0x0, 0x0, 0x20000005}, 0x800) r18 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2100, 0x0) connect$bt_l2cap(r18, &(0x7f0000000100)={0x1f, 0x4, {0x10000, 0xffffffff80000001, 0x9, 0x74, 0x8863, 0x5}, 0xc6, 0xfffffffffffffffc}, 0xe) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) ioctl$sock_SIOCGPGRP(r14, 0x8904, &(0x7f00000001c0)=0x0) sched_getattr(r19, &(0x7f0000000200), 0x30, 0x0) 10:05:19 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:19 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281400]}}, 0x1c) 10:05:19 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000001e40000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14031b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaac47, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x108, r5, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x388}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x126}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x22}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x32}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 10:05:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2438.190219] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:19 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @remote}}) 10:05:19 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c) [ 2438.295026] XFS (loop0): SB sanity check failed [ 2438.299828] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:19 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2438.352853] XFS (loop0): Unmount and run xfs_repair [ 2438.364300] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2438.392623] 00000000: 58 46 53 42 00 00 10 00 00 00 01 e4 00 00 10 00 XFSB............ [ 2438.411793] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2438.425103] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2438.455498] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2438.484459] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:05:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2438.498893] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2438.501315] kvm [1866]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0x187 data 0x4000 [ 2438.519533] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2438.537162] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:05:19 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:19 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000]}}, 0x1c) [ 2438.555094] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2438.594887] XFS (loop0): SB validate failed with error -117. [ 2438.633590] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000407ff0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000e3ecb86d1fb289cec9ef9156d47db2000000fcdbdf25"], 0x1}}, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{}, {}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:20 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c) [ 2438.883221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2438.973216] XFS (loop0): SB sanity check failed [ 2438.978107] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2439.018097] XFS (loop0): Unmount and run xfs_repair [ 2439.031261] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2439.039527] 00000000: 58 46 53 42 00 00 10 00 00 04 07 ff 00 00 10 00 XFSB............ [ 2439.047816] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2439.056087] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2439.056099] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2439.056112] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2439.089178] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2439.097742] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2439.105928] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2439.114208] XFS (loop0): SB validate failed with error -117. 10:05:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000440)={0x1, 0xc4af, {0x3, 0x4, 0x2014, 0x0, 0xf, 0x0, 0x1}}) 10:05:20 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54000000]}}, 0x1c) 10:05:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000001e00)=[{&(0x7f0000000100)={0x27, 0x1, 0x1, 0x7, 0x916b, 0x7fffffff, "e3a106770ca80c0d4b88a789fc50206e9d41fba922ad3b71468399ccf6608339193a2832b2d109b571e99b355e41dc72e1ed7eb5742f0b929cdad36bc45bb2", 0x30}, 0x60, &(0x7f00000016c0)=[{&(0x7f0000000180)="09192ead144a974aa1e9a7378bb35d3ef6a5cb9277", 0x15}, {&(0x7f00000001c0)="718564a9ba736317ccf1b23bfe1e88a610b3a7c3ebc633f2a2c65820140c17deb7ce7f7a608736b4abd956b51504c337a1022dc09bc49fae8dbbf09b4f71702c9587e79a7719e9505ea2b0a9d209460c5d49e22349278088a711769696b6e51c9e9137bafbd22fd0ecaa3552b63ce92eba3bb7b922b7539753f4d5d7ce55ae4414c15371256f20f9460f4e99662d2853a28e1303ffac7c3d8ad14dad3a3314b3fc0799732e1325815cfd2b419cafb4a45fee2a17a92c804708147d70f4861023dab4e13e8b5994b4", 0xc8}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f00000012c0)="2934c7ce09d47b7b31643637f4ed242f47934d28fded546a54b1ebb5b7ee9aa9c68ca564ac4706ced77f02b348b45b91c1039e7d33f7e86013339bace94f931f35db6882c0bfada3bc72b951c46926d6c75c9d6c416324c0f9405a367a82df5898e7532a3f71d37893b37b1120e374bc821511fa98937fcf1e401ccb9701a4334c287cd4063d71754ee17fbbdffdbf526c048743aa6056e0b99cd505a55ab158147f76aa14aa304fb5f70c77ad5d84720b1645", 0xb3}, {&(0x7f0000001380)="c62fae579157f96216466accc09ea4e692936ab12a330c737c586bf06effe81953f591442d43bbf84a14611fa716ee9a863737bd206c7f7b819e9512de121baa39274db784c7f2737db723482560898fcdc7d87cfdd62ab0b1bfe569b068956364635588234e6c1b03b2b2319faabe787ad83d05ff815d9c2f8eca4bedb2aefcb544a70c0a14af74659e07934f8c54d9fd7053d6b62a60bae4a5b5471479d2c22765c78bd5d1ef556e37c74d4f548ad04e35655c4b99181e9170a1ce967dde22d5e4d58829df9fa6199e429c425052e20b54f0cdc111a6f7653ab7facee949e47d9343", 0xe3}, {&(0x7f0000001480)="a9e2c2c065050b2f0a5d2ed9a30b004e56161e1fcb32cbdc7c3ae9bde7208be41808d124204dd8771a04aa1f11b50f5630778e5d8d022557f60a17ca5fe3e027ecf75a4d83582cd766756dfed0ac6702944f9f9037c93fb72bc99a301db2119c1cf0a6edc35ae1443a4ff4c34186e2ffa7cfc1dd3c50a8bc7c7e36eda0fbaf869eb6b8cd88bd9c999532d66d359a8afcbd3e92fc2875c40473c3106b96f52e4f0aa87f494ee4312b8fcffa3e665a102e11", 0xb1}, {&(0x7f0000001540)="707668cf5d5cdc05a9932c8a85ec6d0ed97d161d4e4e3e59cafdc2c9be1384b5cb14754d41de3aa2e750110388b3c757fd473342c5e4f1ac63d83b7194fa38dba2e11976473a421e888c7aaa6039169a16207c8ea9f6873905fc99661bd0b8891c02714c932e1d2719fe427ad1366eb6071e5c0b4e4fb37c716231abc78dc554393147710b99d3c85f2d80a6", 0x8c}, {&(0x7f0000001600)="da860ad62c94688065acde9fbf25ac4ac6510b9cd737bc56269ba6b10d5c45a7b40fad7353625b194f272a29befaa162b10408a39828017fa21bd2dedc62be162baafcef4da30e12a19fca2ebbfa1b0e24bef7bc85b3e92868b263dd46f40853f31bd08cb29efafb4829b662adcb8c47155b2cf64dd6c8f648f5eb2103a18fd3c6d495d7f25e2a24b582a769563a36ab53788ae5ab81b3b294e2ed4b2fe5c2c636e66bbf33c5bcb778a8", 0xaa}], 0x9, &(0x7f0000001780)={0x50, 0x108, 0x0, "7a2998b96eecebe5f9983f6ff16d6e4f45ab95f53eb6da6545decce22a9a4f51d05c4fc5dace89bb89087fd66c56fb1de164828364985b9962a710859d9c"}, 0x50, 0x20000840}, {&(0x7f0000001800)={0x27, 0x0, 0x1, 0x5, 0x7, 0x7ff, "4e9049a1e76cafcc5c3aa6346695f9329bf508237b6572e6db8af08e4c190070b20e42c7ccc682fedc7fbd9cd22091582a290f53f11ca32dd054e558bad971", 0x9}, 0x60, &(0x7f0000001b00)=[{&(0x7f0000001880)="22fa21e8f9141965719694988bbc5a88b77c382a19fb3a537f9d717a0a6f3d71309dca8c37cfd8ebc8d2626d10177d5253709518c4b1312e080df304341014247bde5721e72e6ce9096e77beeeacaa6f32f7d6284d6dd635dc171f018f76d41689b139b990f2c99cfe07888509b6d7c1cbcb2c4b542822c83bc6d354b84af848e89d9029264c88a48d9d403fd4944cb998da57844bd39567200e60baa457b8e0611f1fd09862400cd7cb89bccde909f2c9d49635765010cba05fb358258251e39c15984c01c048b4ab195a7089b2", 0xce}, {&(0x7f0000001980)="d5518eaef77515c63e92326d9043e6d84042c98a63a15ed6cf8c2000b4464d8a57709b7fbed8d081e4fdcba2ad04fce94ed9208550243e17c7fd1bba9d19c206de5048839fc527c2b73d48a73930aeeb139588524324f94e20ff237e1313d699321c6da70aaeb44e87e98e180c06cbf5628337b78fe0ed28231b18c22bcd9ad86506bfd34b0bb3dd11c16bdabf385d0d2cf31e5103d08301695f345dbc6c21ed52a782af7b14cc3e8edb4e5a9f8eca20f5efe2cdfb927803727226cc4330a3c99b50240b1498b78a4f6476263f", 0xcd}, {&(0x7f0000001a80)="5491d02c32a50406d850f35d8e519a1fdb49b889064e2bf1d064c92cbf5677420f7f2b2bb506ea30e63e803a501ca0346d72e711dc8ed1703522da47f50939c6af39d4121290d0ae29e6a3b70a2c7d15fc75cbce25a672afb7fb94107c36dfa0a0463431a0feff6d3ef35fa0f6a1230dfb4a9dced3e06ee0fe34ade717d8c0", 0x7f}], 0x3, 0x0, 0x0, 0x8000}, {&(0x7f0000001b40)={0x27, 0x0, 0x0, 0x1a6f7322570c2e53, 0x1, 0x6, "3fa38cbce861ec23af3bf4bc3681fba07d8cad95adfaf094f94dffd3edb07d4971aa4d283547efd946570c1a8c574f2072e46aa49a2d9dbeb7dfdf518767dd", 0x1b}, 0x60, &(0x7f0000001d00)=[{&(0x7f0000001bc0)="ff2a9b85f676a637e168ab8121bd375278fea125020e5222d1ae8678557cde3d0268821c26dadf6932a5da4c5894d9aa53a34d337a566d7f038122426f5ad4544d7e42b1033af7ca3298053ec496993499811c6fb075f66e94aea1131e3485a7a77ab0df0fe48afa70eb8d9d35cd0d2d0e317d3d3974c97d1a6fffb436d6bd84416c9e5f219719e2f2da3e39a6474b5e16888b", 0x93}, {&(0x7f0000001c80)="bd6025c0a69548fb2242f0345c0ddd70894072699c617f00b7f99a6328374c3be73768a81c28e208d26c9ea2b4a1050b453ac0e54a3afdd0c144e17599c39e98474baf7001cfe541d09f9914733487ba528658e332036fcea94f3e85a5702096627db770c7d0db2587e9ff3cb56488", 0x6f}, {&(0x7f0000003280)="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", 0x1000}, {&(0x7f0000004280)="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", 0x1000}], 0x4, &(0x7f0000001d40)={0xb0, 0x0, 0x9, "d8799b12c0f8d8ebaa83b18a02bcdf558c1ae6017af850718a38109a10addfd2fed1975f7887cadfd162373658f4cb469f8e6f788823c31997e3286535243280706a0da85dde2f3d065d9e8d9a11d07a8e8cda51a67d2bb017c5abd57519cf33fada16527c49ccf726c6ba1b557bb6e39c8de5ad3daa40082b2bcb0f7a11a04585fa48af669f45efb585ad5ff2021ff07254acc5d256fb37f9"}, 0xb0, 0x40}], 0x3, 0x20004084) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2439.223618] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:20 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600]}}, 0x1c) 10:05:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000007e000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2439.369121] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x200342c0}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:20 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd0424ab]}}, 0x1c) 10:05:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2439.565267] XFS (loop0): SB sanity check failed [ 2439.570028] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2439.628038] XFS (loop0): Unmount and run xfs_repair [ 2439.637177] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2439.659812] 00000000: 58 46 53 42 00 00 10 00 00 00 7e 00 00 00 10 00 XFSB......~..... [ 2439.668378] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2439.692024] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2439.704330] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2439.712826] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2439.724321] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2439.732619] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2439.740835] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2439.749410] XFS (loop0): SB validate failed with error -117. [ 2439.884341] kvm [1976]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0xc1 data 0x4000 10:05:21 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000440)={0x0, 0x0, @ioapic}) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x8) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000140)=0x15b) 10:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0xffffffffffffffff}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "91012a6ef2117f62c4950d16277b7c9353d574d0241f4891f67d37b81d990cb875c8d7239e8a2530995a576db8a86597f8fcaac1"}, 0x38) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x200, 0x80000) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000140)={0x4000000000000000, 0x4000, 0x8, 0x6, 0x10}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000038000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0xfd40}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x1fd40}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) accept$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000200)=[@mss={0x2, 0x3}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$bt_rfcomm(r0, &(0x7f00000001c0)={0x1f, {0x2, 0x4a8, 0x2, 0x1869653c, 0x9, 0x64}, 0x3607}, 0xa) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x6, @loopback, 0x9}, 0x0) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000180)) 10:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34008}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2440.251121] XFS (loop0): SB sanity check failed [ 2440.256223] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2440.299782] XFS (loop0): Unmount and run xfs_repair [ 2440.307570] ebt_limit_mt_check: 20 callbacks suppressed [ 2440.307579] ebt_limit: overflow, try lower: 2147483647/65537 [ 2440.310476] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2440.332055] QAT: Invalid ioctl [ 2440.341725] QAT: Invalid ioctl [ 2440.346946] 00000000: 58 46 53 42 00 00 10 00 03 80 00 00 00 00 10 00 XFSB............ [ 2440.355427] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2440.355670] QAT: Invalid ioctl [ 2440.363771] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2440.396732] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2440.412755] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2440.421234] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2440.429492] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2440.429504] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2440.429597] XFS (loop0): SB validate failed with error -117. 10:05:21 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}}, 0x1c) 10:05:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) socket$inet6(0xa, 0x7, 0x0) 10:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34010}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:21 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) r4 = shmget(0x0, 0x1000, 0x60, &(0x7f000000e000/0x1000)=nil) shmctl$IPC_RMID(r4, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2440.541461] ebt_limit: overflow, try lower: 2147483647/65537 10:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34094}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000f00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2440.711692] ebt_limit: overflow, try lower: 2147483647/65537 10:05:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x2fd40}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2440.849375] ebt_limit: overflow, try lower: 2147483647/65537 [ 2440.870518] XFS (loop0): SB sanity check failed [ 2440.875798] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2440.901449] XFS (loop0): Unmount and run xfs_repair [ 2440.915059] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2440.934314] 00000000: 58 46 53 42 00 00 10 00 00 0f 00 00 00 00 10 00 XFSB............ [ 2440.962672] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2440.986416] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2440.997989] ebt_limit: overflow, try lower: 2147483647/65537 [ 2441.007777] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2441.016918] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2441.025714] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2441.049972] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2441.074971] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2441.085050] XFS (loop0): SB validate failed with error -117. 10:05:22 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c) 10:05:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x94}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000008600000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:22 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1cd870c927c49c096926c2d0b06e2556a1824dd76ae8cb10a70bd958a46a88bbfd41013bcd63c0cb7780b98efab67efe823e2aeca47eb7d9450e5ab71454d9d8ca532c92086d877f40ceb3795c34b29c8f6f6328aa1c1aec36bf8a7a0d00556320358e248a93dba40a4a275321977d947a7bee44277346c7d9f71a1e6aec39ad3309fa289fb5efefd852e38192f2049fe7401e82c4c7e7225689de67afbb4c3818307f5d6bf045a0468a2e20f5eab6025a12cd9aceba8f08634136c106b4ffb06be0dc82b7d5b49b93fd28454146b59be87848da06"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000080)=0x4) 10:05:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x5, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2441.536592] ebt_limit: overflow, try lower: 2147483647/65537 [ 2441.573838] ebt_limit: overflow, try lower: 2147483647/65537 [ 2441.604112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2441.623381] XFS (loop0): SB sanity check failed [ 2441.628224] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x10, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:23 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2441.661995] XFS (loop0): Unmount and run xfs_repair [ 2441.677724] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2441.699323] 00000000: 58 46 53 42 00 00 10 00 00 86 00 00 00 00 10 00 XFSB............ 10:05:23 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38cb0100]}}, 0x1c) [ 2441.724029] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2441.752922] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x8, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2441.778393] ebt_limit: overflow, try lower: 2147483647/65537 [ 2441.785132] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2441.817323] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:05:23 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2441.849486] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2441.868839] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2441.882620] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2441.893024] XFS (loop0): SB validate failed with error -117. 10:05:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x2, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:23 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) [ 2441.916708] ebt_limit: overflow, try lower: 2147483647/65537 10:05:23 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000008c0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2442.020564] net_ratelimit: 1 callbacks suppressed [ 2442.020574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2442.154999] ebt_limit: overflow, try lower: 2147483647/65537 [ 2442.245830] XFS (loop0): SB sanity check failed [ 2442.250832] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2442.262260] XFS (loop0): Unmount and run xfs_repair [ 2442.267444] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2442.274394] 00000000: 58 46 53 42 00 00 10 00 00 00 00 8c 00 00 10 00 XFSB............ [ 2442.282757] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2442.291041] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2442.299393] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2442.307701] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2442.307716] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2442.324219] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2442.332575] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2442.340877] XFS (loop0): SB validate failed with error -117. 10:05:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) mount$9p_tcp(&(0x7f0000000500)='127.0.0.1\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='9p\x00', 0x20000, &(0x7f0000000700)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@noextend='noextend'}, {@cache_fscache='cache=fscache'}], [{@obj_type={'obj_type', 0x3d, '/dev/snapshot\x00'}}, {@measure='measure'}, {@euid_gt={'euid>', r5}}, {@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='%\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) sched_setaffinity(r6, 0x8, &(0x7f0000000240)) r7 = fcntl$getown(r1, 0x9) socket$bt_hidp(0x1f, 0x3, 0x6) ioprio_set$pid(0x3, r7, 0x6) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r9, 0xc008ae88, &(0x7f00000000c0)={0x3, 0x0, [{}, {}, {}]}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r8, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x20, 0x6}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f0000000480)={r11, 0x8, 0x6, [0x20, 0xffffffff, 0x8ed, 0x7, 0xb03, 0x3]}, &(0x7f00000004c0)=0x14) ioctl$KVM_RUN(r10, 0xae80, 0x0) ioctl$KVM_RUN(r10, 0xae80, 0x0) 10:05:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x8}, 0x0) 10:05:23 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) 10:05:23 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x94}, 0x0) 10:05:23 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2442.448053] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000028000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:23 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:23 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c) 10:05:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x800000000000000}, 0x0) 10:05:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2442.757872] XFS (loop0): SB sanity check failed [ 2442.764444] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2442.818661] XFS (loop0): Unmount and run xfs_repair [ 2442.836434] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2442.856221] 00000000: 58 46 53 42 00 00 10 00 02 80 00 00 00 00 10 00 XFSB............ [ 2442.879471] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2442.902239] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2442.910690] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2442.919252] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:05:24 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="deff00000000fcdbdf2541a87a4870167753cb1e924da01e57bb307c102266b75de21c5228f2b5dc923757124319593dd060b3a2c43bca8c0cf21affeda7ce6cd9b91a292e1c3696d63490e6e8d3ff4e259e38130cb26e22344bb4856f573cbdb07ab5c3d05832b1b118d51f476ba6449243585830053c1927098dc76cab2c214b0adcb45735e0ac7322061d7a58032c9d56adc9aa76744e8626cfc2f13ef9f3b5fd77ae5af2b04d183567ecfb90c7848bd839e1a42c6ff23e9137b096be8ae35c59f36b0b6a3bcc4e80dff9710000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x1000000000000000}, 0x0) [ 2442.927729] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2442.936531] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2442.944966] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2442.953436] XFS (loop0): SB validate failed with error -117. 10:05:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x403, @dev={0xfe, 0x80, [], 0x14}, 0x8315}, 0xfffffffffffffe7e) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x101, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000140)={0x3, r3}) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x10000000}, 0x0) 10:05:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000001800000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2443.334508] XFS (loop0): SB sanity check failed 10:05:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x9400}, 0x0) [ 2443.358362] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2443.379937] XFS (loop0): Unmount and run xfs_repair [ 2443.396574] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2443.419608] 00000000: 58 46 53 42 00 00 10 00 00 18 00 00 00 00 10 00 XFSB............ [ 2443.438399] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2443.447308] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2443.456238] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2443.489168] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2443.508349] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2443.517338] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2443.527028] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:05:24 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c) 10:05:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000007fffffe00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:24 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000080), &(0x7f0000000100)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) [ 2443.535825] XFS (loop0): SB validate failed with error -117. 10:05:25 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x0, 0x4) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000007f75f13aa12df25"], 0x1}}, 0x0) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000580)) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1b) ptrace$cont(0x18, r5, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x89}) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r5, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r1, 0x9) pipe(&(0x7f0000000080)) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) fsetxattr$trusted_overlay_opaque(r0, 0x0, &(0x7f0000000140)='y\x00', 0x2, 0x0) 10:05:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x10}, 0x0) 10:05:25 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000a0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2443.634185] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x9400000000000000}, 0x0) 10:05:25 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:25 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}}, 0x1c) 10:05:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x8000000}, 0x0) 10:05:25 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2443.879384] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2443.896172] XFS (loop0): SB sanity check failed [ 2443.905357] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:25 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c) 10:05:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x94000000}, 0x0) [ 2443.976174] XFS (loop0): Unmount and run xfs_repair [ 2443.993834] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2444.029739] 00000000: 58 46 53 42 00 00 10 00 0a 00 00 00 00 00 10 00 XFSB............ [ 2444.043167] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2444.075543] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2444.087230] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2444.100611] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2444.122261] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2444.134408] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2444.142863] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2444.151037] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2444.164563] XFS (loop0): SB validate failed with error -117. 10:05:25 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x64f, 0x400000) setsockopt$inet6_dccp_int(r0, 0x21, 0xa, &(0x7f0000000100)=0xfffffffffffffbff, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00002b000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:05:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) 10:05:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:28 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c) 10:05:28 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000003e80000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:28 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) unlink(&(0x7f0000000080)='./file0\x00') [ 2446.772409] ebt_limit_mt_check: 11 callbacks suppressed [ 2446.772419] ebt_limit: overflow, try lower: 2147483647/65537 10:05:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) [ 2446.815297] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2446.874025] XFS (loop0): SB sanity check failed 10:05:28 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0780000]}}, 0x1c) [ 2446.916113] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2446.940879] XFS (loop0): Unmount and run xfs_repair [ 2446.946970] ebt_limit: overflow, try lower: 2147483647/65537 [ 2446.952931] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) [ 2446.978199] 00000000: 58 46 53 42 00 00 10 00 00 00 03 e8 00 00 10 00 XFSB............ [ 2447.000890] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:05:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2447.030278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2447.046990] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) [ 2447.071257] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2447.087404] ebt_limit: overflow, try lower: 2147483647/65537 [ 2447.094296] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2447.113808] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2447.142914] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2447.186148] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2447.212483] XFS (loop0): SB validate failed with error -117. 10:05:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000440)=""/242, &(0x7f0000000140)=0xf2) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) 10:05:28 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) 10:05:28 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000002000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2447.554818] ebt_limit: overflow, try lower: 2147483647/65537 10:05:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) 10:05:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) write$apparmor_exec(r1, &(0x7f0000000080)={'exec ', 'GPL!\x00'}, 0xa) 10:05:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2447.689130] XFS (loop0): SB sanity check failed [ 2447.694119] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2447.728144] ebt_limit: overflow, try lower: 2147483647/65537 10:05:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) [ 2447.736031] XFS (loop0): Unmount and run xfs_repair [ 2447.750650] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2447.759556] 00000000: 58 46 53 42 00 00 10 00 00 20 00 00 00 00 10 00 XFSB..... ...... [ 2447.770240] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2447.780459] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2447.789054] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2447.797498] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2447.836257] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2447.861591] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2447.875915] ebt_limit: overflow, try lower: 2147483647/65537 10:05:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) 10:05:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "00000000000000000000000000000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2447.887582] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2447.901991] XFS (loop0): SB validate failed with error -117. [ 2447.903856] ebt_limit: overflow, try lower: 2147483647/65537 [ 2448.004381] ebt_limit: overflow, try lower: 2147483647/65537 10:05:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) 10:05:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:29 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) r3 = fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) fcntl$lock(r4, 0x25, &(0x7f0000000140)={0x1, 0x4, 0x7, 0x8, r3}) [ 2448.349722] ebt_limit: overflow, try lower: 2147483647/65537 10:05:29 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) 10:05:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000032000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x0}, 0x0) 10:05:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffffb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x1000000000000000) [ 2448.570644] XFS (loop0): SB sanity check failed [ 2448.586119] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2448.600218] ebt_limit: overflow, try lower: 2147483647/65537 10:05:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x800000000000000) 10:05:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2448.641608] XFS (loop0): Unmount and run xfs_repair [ 2448.649648] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2448.684095] 00000000: 58 46 53 42 00 00 10 00 03 20 00 00 00 00 10 00 XFSB..... ...... [ 2448.720302] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:05:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x94000000) 10:05:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2448.741415] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2448.757769] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2448.767572] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:05:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x8000000) [ 2448.812778] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2448.831037] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2448.845904] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2448.863121] XFS (loop0): SB validate failed with error -117. 10:05:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="000000000000fcdbdf25e72deec1e7de3861aa90fbab28d3cd5d2f612d10e04b092031e1b48e523c65e51e8ef0ee5bfcebf390ee291d917a8367f38291c6f3a24cb84e81e7c7e5aaacec060208325f01b7a329aa0be92ae47736479b6c2fea09df7c1a450f8583d515754f62ef3769771bea31490a22a79e3c6831e5d873ce1fd0e4ce251f7ec59e748f72b837eb6e2ab13c7b2374fdfa3e38ad5ece355d019765007762a8994dd9a25fd78908bad67e6248519bbc724bf79a885cadf5c4e5b46b71f5083427cebd1dbbbf434baa75935ea9e2c165b0166d5c755c585179b14ab084192977d1"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000140)=0x8) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x1c) 10:05:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x10000000) 10:05:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r1, &(0x7f0000000100)=""/245, 0xf5, 0x2, &(0x7f0000000080)={0xa, 0x4e20, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}, 0xb0}, 0x1c) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x9, 0x10000) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000007400000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de00990e503f19f000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000007d085c1f"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x9400) 10:05:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20e000, 0x100) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xe7ae) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000001c0)={0x101, 0x73715779, 0xd3a, 0x2, 0x3, @discrete={0x100000000, 0xbfa0}}) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000200)={0x6, 0x0, [{0x80000008, 0x9c, 0x2, 0x200, 0x2}, {0xa, 0x2c971522, 0x10001, 0xde4, 0x1}, {0x0, 0x80000000, 0x400000000001, 0x0, 0x1ff}, {0x80000000, 0x0, 0x5, 0x10000, 0x2}, {0xb, 0x1000, 0x4, 0x0, 0x6}, {0x7, 0x8, 0x8001, 0x9, 0x5}]}) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) linkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) [ 2449.544664] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x10) 10:05:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2449.633348] XFS (loop0): SB sanity check failed [ 2449.638233] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c) [ 2449.718239] XFS (loop0): Unmount and run xfs_repair [ 2449.731822] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2449.763012] 00000000: 58 46 53 42 00 00 10 00 00 74 00 00 00 00 10 00 XFSB.....t...... [ 2449.775498] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2449.780496] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2449.802530] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x94) [ 2449.817272] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2449.843144] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:05:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2449.871990] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2449.885712] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2449.900595] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ 10:05:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff000000000000]}}, 0x1c) [ 2449.921852] XFS (loop0): SB validate failed with error -117. 10:05:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x9400000000000000) 10:05:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000120000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2450.014613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:31 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000440)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) r4 = socket$inet6(0xa, 0x803, 0x3) sendmmsg(r4, &(0x7f00000026c0)=[{{&(0x7f0000000800)=@nl=@unspec, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000880)="dd", 0x1}], 0x1}}], 0x1, 0x810) pipe(&(0x7f0000000080)) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 2450.262754] XFS (loop0): SB sanity check failed [ 2450.267870] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2450.279949] XFS (loop0): Unmount and run xfs_repair [ 2450.285557] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2450.292790] 00000000: 58 46 53 42 00 00 10 00 00 00 00 12 00 00 10 00 XFSB............ [ 2450.301506] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2450.311933] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2450.320708] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2450.329505] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2450.338229] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2450.346980] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2450.355725] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2450.364563] XFS (loop0): SB validate failed with error -117. 10:05:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x200) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) socketpair(0x19, 0x0, 0x1000, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000100)) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x8) 10:05:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x1c) 10:05:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000600000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2450.584476] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) accept$alg(r0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000100)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59f39800352450350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a020000e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca456e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6349b36ae04000000ce0df688", 0x95}], 0x1, &(0x7f0000001300)}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) sched_setattr(r3, &(0x7f0000000000)={0xfffffffffffffffd, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r4 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r4, 0x0) rseq(&(0x7f0000000400), 0x20, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x7, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504500000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x7fff, 0x5e6, 0x7, 0x6, 0xfffffffffffffffb, 0xff, 0x8, 0x4, 0xff, 0x3}, 0xb) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2450.681918] XFS (loop0): SB sanity check failed [ 2450.694953] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:32 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) [ 2450.742296] XFS (loop0): Unmount and run xfs_repair [ 2450.765056] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2450.782756] 00000000: 58 46 53 42 00 00 10 00 60 00 00 00 00 00 10 00 XFSB....`....... [ 2450.800885] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2450.811800] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2450.821398] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2450.830945] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2450.846377] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2450.857590] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2450.869191] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2450.885821] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2450.900065] XFS (loop0): SB validate failed with error -117. 10:05:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:32 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80e3010000000000]}}, 0x1c) 10:05:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008077e54c2f3705b000500ac14141b087cf054a52b232d0bc4bc83d40afbe43741a1e92b1f7592988c3cba70c0d3a4552d75a0f75af80ac572518f710330ac400877c1cfcb83a5a8878dafca49be17a7cf7f0f39d02120d06ce9d1ed008d297650cba6eaa5315fad715279685eaa8313c63484835c2596d585089f3060b81401d7279059f4caf1da2d8c8df50407aedad7b3fed9d0bc635642452edecee3c0c6ca56639b4db64078a047b8ad22571ef7d9d562b90b418b2ce63bbd"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000140)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 2451.102971] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000100)=0x338) 10:05:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000001040000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:32 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c) 10:05:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) sysfs$1(0x1, &(0x7f00000015c0)='\x00') init_module(&(0x7f0000000080)='skcipher\x00', 0x9, &(0x7f0000001340)='skcipher\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) sendmmsg$alg(r1, &(0x7f0000004e80)=[{0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f00000014c0)="174b097dcb58024e3dc5aae8b2285a6cb334ff10aaea5534acc2ef2e1a923e6e2f6e4f0c3584ec7f7d5f34933ff6b0c6ca041b279a9344185aafa74b943660c147a38aceda7c909c9363c03ce1023c0285f0e35cf7fca8ad54c5b8cd44402b88f22e4832254d691445ec17011f14ba61041067b530fdc4b09b5cb1b6b42c3955b46aadd8613974323bb8e7ded93880abfe164bdd5ebffc8a0bd1197e2ae5a7afdc6afc54d63e47f0bb59314ef1dd0037728e45492c1344b3e73db9a9e3666eb070c6bee35440235eb8c56dd3df0010ea7bae543ba9e6e626bd7b8c9118fb0daa7d600903d4be1c4676e799b2cbe5912a72d0d5febdd8b529", 0xf8}, {&(0x7f0000002900)="f12e584aec0c5a66dcb4156bbddc377042169ef77fcc4e06c22c3f97cdb46a2f53e29022ed28078fd2b75707cdcb0d779c5ffaa43fd916a9ef043722e0d9b864204a694cc47d06b37b1aa64bcab288d6a232e0886dd3bf772c09cdfdff09770acf3c262d201cc62d0cdf38bcd6d79ccac49e98c34f7ad667b471638ee363b14db14b3195cd7a4a347528f0dd90a39a71a861bdba8f95ffdcbfb044eb5d37d2affd0b627a4e1d6b55b9ac244263dc7dbc7f65878a66dacb8d6b4c03fa3ffb998cdb8f", 0xc2}, {&(0x7f00000015c0)}, {&(0x7f0000002a00)="c39ae503d37f21aa3ffb64bd96a62d27c3ea8693f623c68e58a921cb0ee6d751dc6bddf3d471be73a44861c7394ddfba6e3abd86a536cdd9ce800c0af8dc5afab10133b6fdc0c0669adb73f572391f4aba9ac1fd145d30cf0a5d4a8869831cebf07612374d23498aa26f221d94421f9ac629b452b6d8e4e9abb98d4dd3609355e4e3904380e235d968b86dfeb65f8b4f2c9d18dbf2aa27fea24f53d8a0b8dc3d43840b1c3bc4b460bcf89793e1541bd6d7f7346c6999c6cbe556dd07f2bdc9e39d395ee20b4398448da7fcf860d29572ce096c0837404be6", 0xd8}, {&(0x7f0000002b00)="7e013320ceb63c40e07fc0f70e90004865ff3e01c74db654d29629944a00c091107c9423fdb3b8b617402b139aacef4a3778530f8e09c05f959e3031d85e6c34b97200540689fd5fb8cfae0aa468912acdc92431b4af9c6868ffa58a3c9d8af010a4a3493391ac82ad42fe671bcaab81437d8722a427c546e69d3b796949004a246638f8039ffabd20b5dacb03ae0a6e340317d85894d65d38f5c8afdaa39e7ccd9af54c236e8445fbc99e7296b5914bb7bfa4369112bd98b95e8ca42707c1035a", 0xc1}, {&(0x7f0000002c00)="67044108d5b7291a69154047d2a4efbe9f6a821cd8d0a5f407434c1a84bce8e4ee8d2ffe02377711632ae0fb1de00967b9e8d55b3ebcc4a8b88ef6f4c1756786118c755437bbc016ed18e6682e51c0ab4dd7843a40eaf6cac64bb72d6881c66b0da786722ba933f458e99883e08a53fcd86f16479a7bf279c4e6dd8518b2c28884b6f99ef03939a2d9391c26c44f72dc13b6cee8bcf0a15e08b0ca0b78ea347aeb61d4decc447c620aa2251556eb6f31b58095a7c1a8dc8b43aba11fc4ea5560e53e0cc91a66", 0xc6}, {&(0x7f0000002d00)="65adbee1cb9360bcee258eb3437b6923accfd67c1adb68b5c372ca32a9b33b54230466b51a7ab0ba5d2b0beb3196774017c19b44941a9ee8934673967a1ef23e037bb675932a5b8002c53f1d33e7f924c75fc8b056c1daaf157cba69fb1a309676656aafc7db82aa174282b5db1c60bd1db72dce7d735e4c9c7818dc21f29d1171fbf5aa2001b6b2aea55046e1e2bfb93d6bbe08e72efeeed2e3a075049e5787bee24a0ebc9d9c4304dcf2dbc570fed9afc69f769e54379911", 0xb9}, {&(0x7f0000002dc0)="dd1336066be3d5e6ea4734568e2202d630841fa8b9fa9a27f770409350f7af677de7afef08f82f0bb7ecfcc7a1b5a675f5d9c762ca343592ea0e6de46e36ade8edbb773833f6d99717f9e369a59ea2684a9797", 0x53}, {&(0x7f0000002e40)="6730e11f99eab94dde5d624e20d1b5d69c9fa04c9018512bdac9d733efd9df13150a5964ae4167e0d94ee999b241ec980418cbb6bfc5aed92c11d2f3883b3e4d9f1dae8b2efa7abfe5f5f7feeba72f3594ccc82e196e8673b4af32abf5d334f33205a414fff12f5d3d4b534db2164e686fed72b405710935327768c51aa5d2745500bbe669bbf4b77a0870fc4cd5f9843d63f7a6cd6871eebc71", 0x9a}, {&(0x7f0000002f00)="9ad4d86707f7a08b2a7303df2a52d6d429b9aae38080050e1f6f6c0db51786ccc5fd5fa44b4d7158c1cbe259be974772378e2129ece8a2bd18178a389a5e48aefba63560b1d123faa44d13e050a8e932b0fb4e15c0e6e6e6ddfab6d029da667f5e15b90f8b599f7e9963448edba1ed71d0604c5eb7a3be3350b9a209cefec056d19cc04f87d41b38f1ec30f71f463a3e92fff56900798a192ed60ea2822b75dc5ee20b5cef6e", 0xa6}], 0xa, &(0x7f0000003080)=[@assoc={0x18, 0x117, 0x4, 0x20}, @iv={0x118, 0x117, 0x2, 0xfd, "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"}, @op={0x18}], 0x148}, {0x0, 0x0, &(0x7f0000003840)=[{&(0x7f0000003200)="3e2a68fdd387512e10894af80169fe65d6779132d76e14a453fb37483509bb1a7d925247df2ceda502b12e95363df6893208950c7a62dc0377bac7d74a71e48e9ea01e96426bc0a698755912e12b6629cdacdb114f4ac88dfdc23f3fdb5799da8a63811ec41032442c43e26b7a01aa410b07f9c9e25a50d5eb15f9505ae0caffb1f3c15b6ab216f3c5acb5bf18bee1249937ed2bf934e1b120b7e94f027eb82a1b36e050a34645f83bbeda98da025f6b417c95cf7c8b5b1c45b8223def64b9a8213509d66b4be637ed6b2b50c1ef1624b106d3f8244cf5e85df8e5fc6a0e80", 0xdf}, {&(0x7f0000003300)="65aa56932a7d9e2a6e7530ed87e24dd62cbe9957dbf56e3bf4c4693e35add1f7bd00c3c86447fc1467ecf9862a4f802b9c385e20e508d1cfbd9bb1a373cd6396cd62cf98bd9c796e3329356600db60b7d0e546d596ee1e8dca5c6c45e078b5a8e5f3ef85becb71a356c5a9c264765f574e0c803f9a2a57a6bd7532e99f8f9a2dce738854fc77352ea61c202cfdf73df8639af75fb97fc480123f88b64a1a24d695c3a1cc0655ddfdb29108d7ad77960cf7df7cf39c001edd1220404c948f1403580260bb6a74d6f20dcc342ed76fb7", 0xcf}, {&(0x7f0000003400)="50e2ce75dbb5097e05d0bb19b2f51087b06404bc10240acdd577ade750d7cc47965d55ab83f28f32b7de1851c50806829b71750603448a76f8230ebd3c1f9fd28847d747cc0c916ef571dc2da3f4990d35341d8f098cbbec6f5d48e3eae264a942af685e198b0a74a85fa1e9b041c1c7045a943c30b52141e41aadfa8312462c2c9b64c4104a510dcfc70bedd46d55d9ac7b5deafd06fc53c1f03c70b65755f449ab2832b4c33998611da1a2a1c7542193d16daab4a19fbedf314f75072c60a5e19cf950726c77db25db467a89904043c6e404bc31f215487d7e407c22b9e30f257ecf7e0fa4d4fd02ec664b18b5a3394a3c99347577eff44ca676613b", 0xfd}, {&(0x7f0000003500)="4d294868371632e824cd0862d239858a0d8326fab8bd20847fb012c721abbef2e20139efd2097565ae9f775fdb113237f9ad501b5739b1a8f19802b189b33400b77c2396bdec938cf5b14e29f31c704318ce401306a7a56c7155dc1eaa39c41699915063482cc9ab5029056918f4b8cff428e655ca44dbcc63bf8353ef833ae513f942f13416b18c4f651e16cae9bc9cc0561903ee7fbf82fa57aa59c4012cee308770cc26f2ca", 0xa7}, {&(0x7f00000035c0)="9e0e67745818bdadf225461cb0321e8c6d22cd3d00b34179d93e7a723d516252feb30bd48f2f3e9f3973bea695ac4126b6a632597686185dd32349fc4f828d5df6f52408add294e4494122666a7ebf6763c5a266c12479e467f1db33ed21ddeb36108f0a639cfc49a07e96dd33521521c5465a36d37ce9c703eb7acafda93ac9ca379db66f60bee95617ec859a7d3c5b170e6cd2f0af2a95ae6ff86a5af1f5852817b4e1b595bb21f1fa89cab9c7bacc200590b91ac025e6431cc80f25ab3d2c6e8e13bac1757a9d4e618752fa9e23fe105541e53b4f2d49d36a485a7792aa7b11485bf506d55789ff4536be8caaaf5e225a3569bb45e4", 0xf7}, {&(0x7f00000036c0)="0f80eeb5f3d7854d4e5e0e62224e177a59e2de3ac4d9db89f0cc1d9ac8260c0cb151905892bf751e648e04040dd6b50af49cb3216c104d82c55201bbcba36449be10b365744d148b14873322027647d029464f1173cacead4c7afcf67ebd17fe055cfecb9c6109048cf78854f5e78f1c937af2cc522c603d3defb04539f69a13eb0eb9592d5b9c4ed79a799a61ee8434dd90137a277a46edf180c594de8e6866bcc1829d69a3a630c3100c3becc4ca24e6e75ea6986be66408c98902be04892910bbb3dd95c32ef33e154428444ce1fcdae994a45b4ff38f3ad2ada376b48c216afcb7a83e9b", 0xe6}, {&(0x7f00000037c0)="731c34fd7e642ba3f903682bad2d9afb90f5bd527a1fbd31c94b815bfd881677a5acd31325aba48db5ec5f0ad0f52f871274a7f373b15fa7228d2f63c943f47da99c11c3ae7bd6518c1df318151264a19e7418fe4fc8ea20a52803868a26186b81efc112e4a652", 0x67}], 0x7, 0x0, 0x0, 0x1}, {0x0, 0x0, &(0x7f0000001600)}, {0x0, 0x0, &(0x7f00000038c0), 0x0, &(0x7f0000003900)=[@iv={0x108, 0x117, 0x2, 0xf3, "ade00811d83621a492baa471e35e1ab58f1d570a84d7428caacacecf26098ed0cc541f50e06c11cc1feee4726a59b981bafb7fe402cea84d2191f73411cd302c12a0d71e6f6af59e535a7928cf8acc263f4204cd6849978434851f53b5a557d3083c91ce7c766e6b66854c5e822006430dc8fe5a0a892912912eef48375bc6d792ce6e26879045a9336b8dcdcb78a6047af40456a9c9be582347caabed5d95feebf8ee53c4e27bb125b1df4474a888ea91054e7c0218d09166d2ba574174b4b260298b795f09ea4887ef4542d438b2a1c1b12d741f84d9b8f9ca5b9619c330c91fc76f295e6e5aa774cba1fe94fea9ad50d761"}, @iv={0x70, 0x117, 0x2, 0x5c, "8126c6d359b1cab6d3b7338685426cf5379ba398b2c1ed9b50a02d71bae39ac9023f3f5be0b07e94afab0e21dccd28e8664791b7a083d91aa641f238646dd3a5be1388ea9148bc28696de62e48946f1756dc6f24073f043a14803e85"}, @assoc={0x18}, @iv={0xe8, 0x117, 0x2, 0xd2, "179027d4e7cbf2dca30dd2f4411fd9296caf704920499f5b69f20bba651fb19f7ce6726d2ec09c3b249ba9e124a3adf21c737d15ebd951ba49b41378110b3e12faf534873a28a2e498aa866cdaca930f0c95d0d444f4a48464d5b8cdab04b3e3b5696d85643bc727c97c70412d15baab1f9b531b5d4857bc797e0999db97ecfea4d1633f356a4a004d8a5f87f8f6edf648c0c2bcbd33314b759cc45afe5065c746c1bcc6c8f42facd5e9c05c022efadaf80555586bbf163e567b72f307ab43970c632095bedecf913bfdd718729f5002095c"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x12a8, 0x1}, {0x0, 0x0, &(0x7f0000004e40)=[{&(0x7f0000004bc0)="0224ec3c57fad9a55048c4d0ef57d89918c062729609903475b46804b89be38effe327ee13ca4a837d141fcf962206872e4f1b5d020b342e05134109f8ba018da8595f7f61a02d2efbf3febb96890b02885d4e4e1289002eee9d75108ba6c065be2fcf9a911ea19508c562cadea628f343dfbb34bc5d31d2c712dc92683f85cf4c27e2e2bcf9e985764ce769a641bff67b1651427340efd2c208bb5fa43114bd979d97ad2d481adf3ee2535d473bf7821d658ccb1e28a31fa5d6154afef6899e003e83eb", 0xc4}, {&(0x7f0000004cc0)="b682abe3883511da3d6b2011", 0xc}, {&(0x7f0000004d00)="998e746263d0db735de469db2c7859857e0a18d9a848329a322d1dfc55c4236467216de176dbc2a79df2b9d4247c692a0709df05b89cd0d57d8855fc9c25bea19aea3f88a1e708031108f2f51d696323b2504c5252", 0x55}, {&(0x7f0000004d80)="12f498a2c0f55e9ac3925ee95e450f822f79b86a4341eef7be3b51bfa46da522ea20e5340ad75830be5d0ff30306f3c7f4122f27880eeba9acf1eabb173a1537fd3f1ad0647c0f6b0a178f3a485dc5380929db0cea1415abf8091f717d81813a6f70645b216c6085c973676995ace3588f21dda0987db678573aa45711ecfb05547b0c86", 0x84}], 0x4, 0x0, 0x0, 0x4000050}], 0x5, 0x20008000) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000080)}, {&(0x7f0000000100)="5448b658af4c14a4f67cc5cf3caa5579ae6038d46fcd7562be953cde0246e712997a61caca4492ba917aee4697dea034a5edc98ffe4325edcbc056bf75cd3abaa77701a8e34e418018c623e0f2145bc2acf0d5b13bcd2db7e818b773b67453a88de5f82693dd89865694a481bd1fe7e972d2550aa31443510eb276a7ea0ecac4ac6315885b8f1424310c", 0x8a}, {&(0x7f00000001c0)="a6d5cfa490ca9fb6d5e9a9f3b8e2a1c0d3864bd4068b368227a7451208dfa68d17c0269afd1f60c6831fa7c2bfd495f825f3aa50dbeb0d811748f622d7206c7e09abc83e7f460eea08684190de782601a6670ee8f2d344e7ddfa7496dc3387a71233b914cb877154c4873b016b94412dd9ea166b1f536533515845960c6f8c67f6331e1e827754da4d1222a88fa1af0d218d6764b6917d5a824e352c5d3c172502b1fe5f4bae71c302fe7c264f54127e616ccc49a38b530811231e9a1c33c9181e5c3ce7401db573be3083efd731ebb989", 0xd1}], 0x3, &(0x7f0000001740)=[@iv={0x68, 0x117, 0x2, 0x51, "b87604e03915973a182165f2f69a0523236f2ce60f094f0124612084ed8558b099c30dbb61b1c9314d8656c3707a445a190c1f64af62a33f64bc807ff19ea2ad91cdad362ec758eb4ce2c3a1969b98128e"}, @assoc={0x18, 0x117, 0x4, 0xffffffffffff8001}, @iv={0x58, 0x117, 0x2, 0x42, "51524b342e9936d350b52a6e3474fd09ed564649a5b327054b18dc76210f84a90f9e0c33f6c7a65dd04fe6a1b4b76cf55eb62d8017be04513ce300d1fd2d05145919"}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x98, 0x117, 0x2, 0x84, "640983d19edb3cb765c1c799c9d54591869aa2b4e4ac4ccc511aaca606c0ca1980db7dc989f176f20abb36d88fa3e357f12acaa7b1f75ea7a95464fb5d34ee64bcb4cf3795d533079c9ea1ce9320e31c48bfd620a9b1859d99cd0288622600b5a76e950f030a6587b1ba1f2dd8c27575f39a800033ff6c5864cf67b62abd61fd50e7e0c5"}, @iv={0x1018, 0x117, 0x2, 0x1000, "b61456f3beb1d87cb7703ffe8741fe3b722228a85b8c382bd2429653bf7e2d6fc650dd7bbe84964fe53a0e609f8b51878fc12cf0180bf3b43c2bd640d056ac14a75def4972eb4586c75d157dff38aa6d02dfa2d8bad85911b015ad1cf7de2839d93dc208e0719915b3f1a6743a0341fbe9edb0a8bf04175a1c898de8be549f11787a152044117752fd195c2e777beeb628c4e6d80f90ebac65fd04a34e7d222c93da3b2215e8979e423f8182e4d771e44a37f298314d268016df993dfd60c6c2e518fd18ec365fa083a6ea8db94e01f5866ccff0fa132a2c52a8afb5093ec833fdf2731b14ab0bb5a164b48f237768c1f6040b3c6d620420b28d189c32fe924b1aca28d26632500db510cf494d91df6afd0a1d6817dc4cf4af81895d5bc4283e592796e6d8df7c105cbdfc20b0c4cd0aba1808547f9ebeabe61f5330c69182eb8db2e59b1cff1afc033e5037615544326d57f6b2572d4cf650f8ab9bd3c2a924b15df8aef81e87bbb5ef7a699d76cfc7dc87cf8fb6169f616e9e3d8938db99dc94fc7c3445de9dc1723d72fa2200a5f15dada9ae5718612d7d6c4ed12b806944fd716a9a0015db0489dc1f1428f78cc138c6d102c872b9e784e4f339eeda352811cb4fb19c828a0981e7dcc74212b9df12833d66ce805fe3048c29bc2c958bb85a473369b9cf59bbb3ec4b6499b68b9485179e1a22d47524367de27e1814ed5bccb23be4cc11455c11dc57bf4d2a5c3af46f2f23309b21b5ca6adf07df22c5e6079cabebfc37bf683d6e57a9070c4ac6d826291f49ffdf31b7cb530b24bb2955bb7437352c4214339f80a05363c6feda505d199bc5da60184deb1e15ce28c7fb46c34ab4632fa904678ff733dcd2fe1b47da06543b314a5afe4c4339e8cbe69617b9038d144c66849b7dffdc158a63299ec0ec94403892d9ec497e4350cf154c4e4cf61b999c9e298b92ea4e09d6ed6c249f4a247259268c1a36f816f2513066fffacfb27462886cd82b592d3c2fd61f15c1730eb6b3dca6920ecf9a1be224315927a3827746d25cfc61baa0371a4bb37d412043faa57bbfb9b89099e1bce21e6fc039b403b973b863b8ffc75589f83792be4a6c31f2925b3bab19551f14ec4252f1881c5a8f3ba45bb5f79955e0184c53d78ca5ff26641211ec2460e7cf4047b84c423eca55b581966c5a76828c7c205ac6b1a5983162c6c0b81dd251f61119a4783080ce16e815281c346ba6ad93c505642c6290af245985f0ed52f705105743dec1de33b841a718fb6cf4fdb6d5a0af200d822cd2f84ca4efadc56e9775f0db845c09935b3596173d81df98950182a344fe4e48e693ee21362dbd11b3fa9fc91c4e4343fa14dc7c94a0968dc2180dedce8a85c813c3f70b15b59109d60c6a1c91f6b8ed53754fe30508f29bc0d381df02d6fa9ad9734fc84b32e621a15f4824e7dc2058d5a9049bd8ccb8906e7d1ae540c30226bca0f89c57f1eea28bb10a02e26fe7efbbfb134218725c67d9f3ffc59058569cb9723f308471242ee09873948640457559e217ff5c51bd167363c55e576664124079ecfe79ea738b70e748d395ab7eb7de8d74a217786afcae300588d39c601befcbb27f0823138e6c949a61b0502899501862c7dc9af45f42cbe97d6cfd0bde13eaf8726b0690af270b9115e7553ac4400598cd4442118b6d71c54df52022e3f373828136524f0860904846eef9627ef2ebfb7d19690a8f0fce4279cf718a748d541328c0ce8861735830c7f05b9fd22e985f740af2ca1b6cffab2a082537f17f2c6298614959c2b00c22cdd61e70973902fee1b3993cbc0e0d83e86e0b4e797e62c33b94efbe0ac1d47c14b4f23764af297824f5852e1e78abc7cc76f1259bcb618e2212b28d3e8b0b4d266912d09c6e166fa1ea25a93e7a9315b4b4c93aeaf1189bcf90f6327af991d385980b691d86f8dda4fe4140fd84a77a071d02dd704939c91fbc6c987fe9f183f611eff6ef5694276777a178f3a7b8e771ed56504ffe63294eeb3d82c4a0898435bfaac86094958165cce2891d2c486558c78cee6b2707c650ea1794089d86153e7d75ef38cb099c9fb6a2f9fc9b2595ad73508a12a24b71ec6a6c610fa06611213baea442b5346c0e95b4cc3e37130750d5738771cb7b3c4e21d06162915dda2f8611b9922616449f1941e1eec433b067cc2466562b2824350f70aaefb7aed7a036b14f498e5bde58db2a7c8122cec24b9f3abb4a27a6348ed9878e042ae2c758c22fde78101a45942a054d4e120dea50fc64ada910bedfbad4d1474a9ec2b7fd91d4221094f5b4749c4986a0f7137614489b3226be7e953596ede3ccaf8eaa5d7605f1986c5d7ce19218d47172e8b7134f688bb06296c4abd99bd0588c1a4c6eb133cba932156286a0a954f52865e8db9c24bd08da8094fa4f406dfa05741bfa034544ccf99ca9ddc855134338a20fe9dadd90df047e89a4c3c9316591358746fd9ce9da2a04134d865fcba3db8ae47e1e468db82caea7d8152663f44ac829eea60f38c87763498091335cced357aacf50a8f5ad06a9987bf16849427f0d799e612ea2594226a63d9e1900b9befa28a711c026dc9ea2839e26648cefda5295b3a63e0ceae2861a3f81a4a3fb03d50dd07ef9205ea572b2a6dd84c7fe5b35dac06e6cfbe7ac0f9f9254108d565822ab2608e04ea172583148635b53487574282b0680ffe24f36a28bbac40b5b77765a204e9ca0bcfafb7f8f941f56607cc00f20261f05fac7d137afd182da4aeca2cf0138ec1ebcc1cde5f27cd2244d86fbeb81e705414301b725923c903df1a17f7c39fde0b68d06c3bc664a61d4fd34bc9921d8d0cde6732be601463bbdd81e78a6759d4debe83d5453ff8b08236c2d5fbfa429e7a6214dae1373ba9f438f3caf21f07b947b60cf3eb43397263bfa55e99528453fe1c1b7a2494e1dea65e56715baeceeeb4045a4b31211aa0029a120d01b6355b603db110bb01952f3a3c303e2a36a262eafd8661fd53c10e2063458de0594e2388c4775e911cbe8bf738c310b9ca6e5d5c3260fd144af03fe00450430c2e1d85829dcfc51b00d73dfdc751637bfc765c2ca268884c57c1348c9363e3fcf1d4f2d15b1d73f8faa94e26e686d67110b84d3c915b8a68c0b8018cc790da39f60d55afcb2b27541813c03731b60fd0f341c192cffc197ecbc801f5cec804bddf23eee7922eb83a54e7e1fd247e6ebcfe8896481307c37d7bf9d17944af36ae758a868f61efda0dbf3a9dffd4bd2153a5bc8e6ef80a2e1a963b42799480457a92435bf6175fc791c7d89ab69749c64d36f06d51ee63f40460c184e50f61aef5cb788d8c66b4ab801997075a3042c044e3aa9e36f308ab8e3c53fb6e7ed8c2cd1497a5ff7273caf9f666f6db0da8b03ae553dd7e592f00d6403343101f299aba9fed4872e054db50fe2c804b8bf3f2cd7d4a2fe34c77f80efd771ffceb6c8acea660572adadada3c34620b643cd0b4b0f4d166f8cba2389e66d2e5ce1c99e4727807880ba76245839e01c0e6e259bb8caa84024fb6f0ae4bea5dc8f4be990882816b51bfb7c366422a6808b7bd462da6c2b8fdfab741e6b12396ed57f4e08f60cf5078e5e4802b4e7a942776180edc26b1f45c625b8ebe39357c6cd2c8446bd962161092af138c874e5f4f1193bc88090a705ec4d6738b8df66de5ea99e303585ab40d3bc911226418d48d6276e6fc164f90474c004bf9eb78ca194e1d063eba978215004bdde9d2c9d658245239cad1d4cddf6bfc765f0e3378cab6706c4202bf3941f999c343a5c82ee9a166908549798e915cdd3b95fc7b9e3f1a6d88f5a8f2d8ba5da46d22f9942ca15c3d1986c171195b54a13cd82e0d42827ea9cab10dff186a2b601a43555ce2da2e812d43aee0c553ba6ca4768073cdf1c5372555d9aa3006a01f8c0baf13184b8056220504f8dd980428400fbe035ef4ac1b91331f8bb59a49082b3ae15a71cdc3eecb5190190c8d0a317ef8ebf67c10ff06f248d2341794178d72d2d64cf5b3ae98d8156f2b23b8d09ec882584f40450dd9987a673cf957e0f39ebdd065e86b0a68f8aff1e0f10c20439c9eae6dfa4dd201ad956190c62fb92bea49a91606b9fe0b3e69e47715f11d1a79e8701e0c5fecb4a7a46d2520c3e6bbb40816d6de2f61f036a979031c9b305d8dd7b4674d13e913158640b2070af80178bbaf8382f86f6d2ddde953910fad664feb6f5d8f8b1024ffd69b592718ddc86c36ce95041d902769f5a651cc96b34a70e09388a002f9482bd7d38c3948441f37f574bd04197dc939f2d313ca235328078b0926330526fce0f0bb755ff862def27c44101ec3317cd05227f0e2be55fb40c9a1c4403fda5dc34dd997a108346c86f286fdb7530348b28ef35636575b183bcecd2415ea6237916aa6ca8cd36094050abcc058080244074f3d103ae41f22da4fd17743305ffae8596f5269d6e0a06edb0932856055d0ddc45765ed388b37ea138f2582e982426717cc0a87b89020a6f136df5d1df3a94ca0bedd73f59a6a37420e84ccb8c944f39f042d005864518ff1f088e4af8ad00f2bc5e109531b440b543469acc115759be8657b68a15b7b4022b545a5b3ed59ffd1ab6938830544277a7a376fba8dfc697ca4efa3c620869e16a8b272417999dd6551522d86157fa5347102ec1e7706bee2f5abde27c7c04af11f35c78f324083a261d4c0a4a9afa7208986a29d7cfc3dee41405b1e1e603ea626949e6ec10791723eaefb6b74d8e3077644ef8c9a38ae9c39236ce676d723ead1d57fa640944ca663745280fbb0a3b31e1bb4f423937726caf2aa73fc4a6dbbaa5345172f2b5c78726bef64086f994ad1854374775829aff87efa04c60e1ac06074d931726a67d642ffb3685758b2ff3087146af79c13a3eda83564e9391817a7e6ffc711c1f4f58ff539209bf0f02e5feac6b6a1386570cc9c10b28ef58db47a4b23aacc53ef805f7b6c85bbd563c040c1959278850e5cf6dc2d2f3ec94c4e514866c1aac4a5d27fc17ad413be5e428df5d66b549f202e27686d25979e3b44c7f40b5b8b94d4a83686bb7b9e17abaa5e9ec0e7a432271efb88edae7d15e675b58d9432b4d6e1d4401de71e689f50d23ec69797b6fcef750e67f73f8abcde57c47a5e6d45c42b71b00346c00e7e522d0104da96932185081bb37cc56ffe3ce7d33cdef67103e5af27bda1006f3d041f7fea932f64e2793610237413d09f52104888e846bd39e72d063ec6552cf1ccd7f4766f4b7913c50ea0cfc3240c5c636fbf889f26aefedb40c4188c5497b378f99efb274fc20a2b5447e9dc29d0fadbf950d55b2c978f0ccce6b9c49bea79191cda0d24a5ed337bab8ae733fca652c6aa9f9ddf993bc535bd3a6ac1c789761b4ad31e012016ae63ba0f8019ef35a3b05ecb6295613b63baf60f20cb786992e27fae64b510d1178d3a13af3806f6de4a60f00452ae419403c288240bf2e2a48050bd1548223f1e4396c3e3d417a4f6b60994a1181121845230d72bfe0cbf2ff14f6aa098d56404b7111d8e3b1e80597f7162d8841ce716d3f6dcec682675171eb66e75ca4bf2aee236ef82dbcf70add33aa41e5954270654a7d50b8ef8fcc3a6c8652815727f6bd6104073253d2c40dc9ead642cbfdfb5ba38830340ced4a00f718b748cc2ba2625a6437e9c889ef56f234ce402467b2e829dc0275de4897a45ad8ea449c274c12f053be0ce8a9a05397991b33ea7104509ce9b4e5f8b5559520721b3f8d7255f6923657"}, @op={0x18, 0x117, 0x3, 0x1}], 0x11b8, 0x20000010}, 0x1) 10:05:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2451.554375] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:05:32 executing program 3: syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001580)='/dev/mixer\x00', 0x40040, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000001740)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x100000001}}, 0x1ff, 0x0, 0x6, 0x8, 0xd6}, &(0x7f00000015c0)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000001600)=r3, 0x4) [ 2451.645159] XFS (loop0): SB sanity check failed [ 2451.650154] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:33 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) 10:05:33 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40880, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f0000000200)) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 2451.685889] XFS (loop0): Unmount and run xfs_repair [ 2451.704141] XFS (loop0): First 128 bytes of corrupted metadata buffer: 10:05:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2451.745123] 00000000: 58 46 53 42 00 00 10 00 00 00 01 04 00 00 10 00 XFSB............ [ 2451.762370] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2451.785158] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2451.786591] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2451.796278] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2451.814381] ebt_limit_mt_check: 18 callbacks suppressed [ 2451.814391] ebt_limit: overflow, try lower: 2147483647/65537 [ 2451.829645] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2451.872511] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2451.898452] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2451.934615] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2451.963477] XFS (loop0): SB validate failed with error -117. 10:05:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x270}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x208000, 0x0) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000100)={0x784, "e2d6e427679c588ba30223810695c8e904c6889d5614b6827fc07118907681fd", 0x2, 0x10001, 0x2, 0x0, 0x112, 0x2}) 10:05:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:33 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) 10:05:33 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64\x00', &(0x7f0000000200)='/dev/snapshot\x00', 0xe, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:33 executing program 5: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000100)={0x5, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e20, @multicast2}, 0x8, 0x6, 0x68a, 0x4, 0x4, 0x0, 0x3ff, 0x4, 0x1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:33 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000004c00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2452.387268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2452.399784] ebt_limit: overflow, try lower: 2147483647/65537 10:05:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000180)="d3a1f78a68e223dc77b40be9546ab96e2f34196352475851e1215c1216524b7798e6621013b9ab1219d2ed4ea944e24334853f6d34", 0x35) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r2, &(0x7f0000001480)={0x0, 0x288, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x12d6}], 0x1, &(0x7f0000000100)=""/123, 0x11e}, 0xffffffffffffffff) 10:05:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5a8, 0x200000) setsockopt$inet_tcp_buf(r2, 0x6, 0x3d, &(0x7f0000000100)="8207069ddc305f257da663bd873585ec9e976e983bf90d9caf706061458e9093849f60463ee2f5a0f19a02a746a0aa85fb94238bb01d2e5afe0267500518e1a1189bc834485ee3b41d242636e993d20771cd6d50922b481f740da2fc98bbffcb76eb39db819d72d953475338b8a53ac518d7671c225b494772b2141464f62b02ff", 0x81) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001580)=[&(0x7f0000000200)='ecb-cast6-avx\x00', &(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000280)='ecb-cast6-avx\x00', &(0x7f00000012c0)='/dev/bus/usb/00#/00#\x00', &(0x7f0000001300)='/dev/bus/usb/00#/00#\x00', &(0x7f0000001340)='ecb-cast6-avx\x00', &(0x7f00000014c0)='}\x00', &(0x7f0000001500)='skcipher\x00', &(0x7f0000001540)='\\$\x00'], &(0x7f0000001800)=[&(0x7f0000001600)='/dev/bus/usb/00#/00#\x00', &(0x7f0000001740)='ecb-cast6-avx\x00', &(0x7f0000001780)='/dev/bus/usb/00#/00#\x00', &(0x7f00000017c0)='lo*[&\\]ppp1\x00']) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:33 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab2404cd]}}, 0x1c) [ 2452.530436] XFS (loop0): SB sanity check failed [ 2452.540547] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:34 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0xffff, 0x9, 0x6, 0x0, r1}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000014c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000200)=0xe8) recvfrom$packet(r0, &(0x7f00000001c0)=""/45, 0x2d, 0x40000000, &(0x7f0000000240)={0x11, 0x1d, r4, 0x1, 0xe800, 0x6, @broadcast}, 0x14) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2452.602321] XFS (loop0): Unmount and run xfs_repair [ 2452.607593] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2452.616761] ebt_limit: overflow, try lower: 2147483647/65537 [ 2452.634067] 00000000: 58 46 53 42 00 00 10 00 00 4c 00 00 00 00 10 00 XFSB.....L...... 10:05:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2452.663854] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x15, &(0x7f0000000080)=""/28, &(0x7f0000000100)=0x1c) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r2, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2452.714921] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2452.742325] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2452.743165] ebt_limit: overflow, try lower: 2147483647/65537 [ 2452.754286] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:05:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2452.786892] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2452.802257] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2452.812864] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2452.821568] XFS (loop0): SB validate failed with error -117. 10:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xf) openat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2452.869866] ebt_limit: overflow, try lower: 2147483647/65537 10:05:34 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x44602, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000200)={0x1, 0x7, 0x8, 0x9, "02a45440f4bcf583ce3da5ef2bcd38c396ba0a3146154e2b87cc2db2657c0f35"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x3, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x5, 0x0) fcntl$getown(r1, 0x9) pipe(&(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:05:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x2, 0x202) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000100)=0x80) 10:05:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000004800000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000080)='ecb-cast6-avx\x00'}, 0x30) ioprio_get$pid(0x2, r1) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) r4 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback, @in6=@mcast1, 0x48, 0x4, 0x4e24, 0x3ff, 0x2, 0xa0, 0xa0, 0x32, r3, r4}, {0x9, 0xffffffffffff0001, 0x4, 0x5, 0xfffffffffffffff7, 0x7fff, 0x100000000, 0x400}, {0x1, 0x7fffffff, 0x7ff, 0x7b07}, 0x0, 0x6e6bb6, 0x2, 0x0, 0x2}, {{@in=@remote, 0x4d2, 0x32}, 0xa, @in=@multicast2, 0x3507, 0x4, 0x2, 0x1f, 0x0, 0x5, 0x9}}, 0xe8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r5 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x14, &(0x7f00000012c0)="94c06de3d182893a95a782db254db0ac0d2df064e31d203a56a2d4a23a75b0e1a4c6f98f30d07b6c6a6f5fbb8dd165fad57389afdca4b0981bbf46d19c8554e98d6503f4d2d305cd55ed664cd70acb0e72efd0a3708d45efd6d1e92b561b580448131694f4a5714cbdfac98e249e608df7ea9c70d0b2c5e07764c7", 0x7b) recvmsg(r5, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:34 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 2453.277537] ebt_limit: overflow, try lower: 2147483647/65537 [ 2453.393682] XFS (loop0): SB sanity check failed [ 2453.398662] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2453.410486] XFS (loop0): Unmount and run xfs_repair [ 2453.416012] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2453.423790] 00000000: 58 46 53 42 00 00 10 00 00 48 00 00 00 00 10 00 XFSB.....H...... [ 2453.438462] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2453.448797] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2453.457617] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2453.466430] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2453.475077] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2453.483643] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:05:34 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x1c) 10:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x90100, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x4, &(0x7f0000ffa000/0x3000)=nil, 0x1000}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000280)=0x2000000000000008, 0x4) recvmsg(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/4096, 0x761}], 0x1, &(0x7f0000001400)=""/123, 0x29f}, 0x10101) 10:05:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) ptrace$setsig(0x4203, r2, 0x40, &(0x7f0000000140)={0x27, 0x3, 0x0, 0xb5}) [ 2453.491986] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2453.500613] XFS (loop0): SB validate failed with error -117. [ 2453.548444] ebt_limit: overflow, try lower: 2147483647/65537 10:05:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="58465342000010000000003d0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) [ 2453.658974] ebt_limit: overflow, try lower: 2147483647/65537 10:05:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002840)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0xffffffffffffffc8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xb3c, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000040)) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000100)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2f3e77a171a9c07c9386793e2cea1b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688994d44aa90f0ae57bcd71b92a1207ed0c22a8ba4f3b22cbd72a182268765a2d049a39a83f9", 0xc7}], 0x1, &(0x7f0000000080)}, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8001, 0x400) ioctl$DRM_IOCTL_MAP_BUFS(r3, 0xc0186419, &(0x7f00000016c0)={0x6, &(0x7f0000000200)=""/6, &(0x7f00000012c0)=[{0x9, 0x33, 0xfffffffffffffb47, &(0x7f0000000240)=""/51}, {0xb726, 0xd6, 0x4, &(0x7f00000014c0)=""/214}, {0x3, 0x1000, 0x6, &(0x7f0000001740)=""/4096}, {0x7ff, 0xe2, 0x6, &(0x7f00000015c0)=""/226}, {0xff, 0xde, 0x81, &(0x7f0000002740)=""/222}, {0x6, 0x30, 0x1, &(0x7f0000000280)=""/48}]}) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) socket$inet6(0xa, 0x80000, 0x1) [ 2453.814421] ebt_limit: overflow, try lower: 2147483647/65537 10:05:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2453.912692] XFS (loop0): SB sanity check failed [ 2453.921122] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2453.955573] XFS (loop0): Unmount and run xfs_repair [ 2453.965750] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2453.973192] 00000000: 58 46 53 42 00 00 10 00 00 00 00 3d 00 00 10 00 XFSB.......=.... [ 2453.981879] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2453.991187] ebt_limit: overflow, try lower: 2147483647/65537 [ 2453.997654] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000280)={0x3, 0x1, [0x7, 0x3f, 0x7fa2, 0x5e7, 0x101, 0x7, 0x2, 0x98c6]}) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r3 = semget(0x2, 0x3, 0x400) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000100)=""/225) [ 2454.017765] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2454.033152] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2454.080302] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2454.093544] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2454.119763] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2454.137803] XFS (loop0): SB validate failed with error -117. 10:05:35 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="000000000000cadbdf2578398921fdb59204ab50defd06fd7c352d7867fd2f80d5c227609e3e29c90a68fb6df1854273e6cb7c61b59dc0d336431a88183b811c17c840a74c8c73a88272f753dafa"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2454.256806] XFS (loop0): SB sanity check failed [ 2454.261625] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2454.278287] XFS (loop0): Unmount and run xfs_repair [ 2454.284760] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2454.291708] 00000000: 58 46 53 42 00 00 10 00 00 00 00 3d 00 00 10 00 XFSB.......=.... [ 2454.300390] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2454.308938] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2454.317521] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2454.326032] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2454.334626] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2454.343074] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2454.351455] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2454.360022] XFS (loop0): SB validate failed with error -117. 10:05:35 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281400]}}, 0x1c) 10:05:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x5, 0x100) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000240)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000180)=0x8) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) r3 = accept$alg(r0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f00000012c0)='security.evm\x00', &(0x7f0000001300)=@v1={0x2, "5823d5645cdbaa33dc74b94b36"}, 0xe, 0x1) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) accept4$inet(r1, &(0x7f0000000040), &(0x7f0000000200)=0x10, 0x80800) set_thread_area(&(0x7f0000000000)={0x5, 0x0, 0x4000, 0x80000001, 0x7, 0x4, 0x8, 0x8, 0x4, 0x8000}) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 10:05:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000fff0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000340)={0x5, &(0x7f0000000300)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000400)={r1, &(0x7f0000000380)=""/73}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)=0x0) syz_open_procfs(r3, &(0x7f00000002c0)='maps\x00') r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1801}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01062cbd7000fcdbdf25030000003c00020014000100e000000200000000000000000000000008000902d1ffffff140001000000040000000000000000000000000008000300010000000800060000000080080006007f000000080006000600000004000300"], 0x6c}}, 0x11) getsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000002240), &(0x7f0000000000)=0x11d4aa717184891f) 10:05:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 10:05:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x400, 0x100) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ff9000/0x4000)=nil, 0x100000000, 0x0, 0x1, &(0x7f0000ffa000/0x2000)=nil, 0x9}) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2454.591688] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2454.666286] XFS (loop0): SB sanity check failed [ 2454.675268] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 10:05:36 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa078000000000000]}}, 0x1c) 10:05:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2454.714778] XFS (loop0): Unmount and run xfs_repair [ 2454.732876] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2454.753864] 00000000: 58 46 53 42 00 00 10 00 00 00 0f ff 00 00 10 00 XFSB............ 10:05:36 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x20002, 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e22, 0x40, @mcast1, 0xfffffffffffffbff}], 0x4c) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) recvmsg(r3, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 2454.791889] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2454.833934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2454.842261] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:05:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2454.883145] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2454.904140] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2454.914835] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2454.934918] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2454.949004] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2454.990359] XFS (loop0): SB validate failed with error -117. 10:05:36 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="145f420000000000000007ff0000000003001f87a7e9b2dd0bb608a894f6c1a0de0006000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000200)=0xa5ad, 0x2) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000fcdbdf25"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) fcntl$getown(r0, 0x9) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000280)={0xad, &(0x7f00000004c0)=""/173}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$SG_GET_LOW_DMA(r4, 0x227a, &(0x7f0000000140)) 10:05:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001640)="7d3948184ddd649019793cec387931e86badd859def63d352c63dd3f2f9c59b398003524350d92e17828605787abe52f24372d58aff6f8ad897a25718c02e2b9d95a02d2c3e531247ed14941c96eaafc5569525990eec29ada709830dbb2511d76f042fc5bf722f73c878a927dca476e58a1023c00cb59f52c05ba1bc8340838ee1ab1ef44f375c6219b36ae304a99e1ce0df688", 0x94}], 0x1, &(0x7f0000001300)}, 0x0) recvmsg(r1, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x10000, 0x0) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000100)=0x1, 0x4) 10:05:36 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000030000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000806c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, &(0x7f0000000280)=ANY=[]) 10:05:36 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4021}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab2404cd00000000]}}, 0x1c) 10:05:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000006780)=@broute={"62726f70746500000000000000000300", 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, "000000000000000000000000019800", 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 2455.163481] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2455.303629] kasan: CONFIG_KASAN_INLINE enabled [ 2455.311084] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2455.322763] XFS (loop0): SB sanity check failed [ 2455.325674] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2455.327549] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2455.333683] CPU: 0 PID: 3294 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #341 [ 2455.333692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2455.333730] RIP: 0010:kvm_pv_send_ipi+0x364/0xdd0 [ 2455.333770] Code: 45 84 ed 0f 84 da 07 00 00 e8 e8 51 66 00 48 8d 4b 14 48 b8 00 00 00 00 00 fc ff df 48 89 ca 48 89 8d 70 fe ff ff 48 c1 ea 03 <0f> b6 14 02 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 f5 [ 2455.353656] XFS (loop0): Unmount and run xfs_repair [ 2455.361441] RSP: 0018:ffff8881ca8b6ed8 EFLAGS: 00010203 [ 2455.361455] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000014 [ 2455.361464] RDX: 0000000000000002 RSI: ffffffff81193908 RDI: 0000000000000005 [ 2455.361471] RBP: ffff8881ca8b7078 R08: ffff8881bdf64700 R09: ffffed103b5c5b67 [ 2455.361493] R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: ffff8881ca8b7050 [ 2455.366391] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2455.385202] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881ca8b6fd0 [ 2455.385214] FS: 00007f87da7bf700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 2455.385223] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2455.385231] CR2: 00007fd3c593f7d0 CR3: 00000001b2c25000 CR4: 00000000001426f0 [ 2455.385242] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2455.385249] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2455.385257] Call Trace: [ 2455.390315] 00000000: 58 46 53 42 00 00 10 00 00 00 00 03 00 00 10 00 XFSB............ [ 2455.395636] ? zap_class+0x640/0x640 [ 2455.395658] ? kvm_apic_set_irq+0x170/0x170 [ 2455.402970] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2455.410162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2455.410179] ? check_preemption_disabled+0x48/0x280 [ 2455.410198] ? __lock_is_held+0xb5/0x140 [ 2455.417510] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2455.424771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2455.424788] ? vmx_read_guest_seg_ar+0x21c/0x270 [ 2455.424809] kvm_emulate_hypercall+0xa1a/0xf20 [ 2455.431510] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 2455.438726] ? kvm_pv_clock_pairing+0x760/0x760 [ 2455.438748] ? zap_class+0x640/0x640 [ 2455.438764] ? mark_held_locks+0x130/0x130 [ 2455.447033] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 2455.452841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2455.452858] ? check_preemption_disabled+0x48/0x280 [ 2455.452876] ? __lock_is_held+0xb5/0x140 [ 2455.460171] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2455.467385] handle_vmcall+0x15/0x20 [ 2455.467400] ? handle_tpr_below_threshold+0x20/0x20 [ 2455.467416] vmx_handle_exit+0x33d/0x4630 [ 2455.474727] 00000060: 00 08 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 2455.477235] ? __switch_to_asm+0x40/0x70 [ 2455.477252] ? vmx_vcpu_run+0x3a73/0x5bb0 [ 2455.477267] ? vmx_vcpu_run+0x3a67/0x5bb0 [ 2455.485444] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2455.489079] ? handle_vmfunc+0xa10/0xa10 [ 2455.489091] ? vmx_vcpu_run+0x3a73/0x5bb0 [ 2455.489108] ? print_usage_bug+0xc0/0xc0 [ 2455.493504] XFS (loop0): SB validate failed with error -117. [ 2455.501545] ? vmx_vcpu_run+0x3a73/0x5bb0 [ 2455.501556] ? vmx_vcpu_run+0x3a67/0x5bb0 [ 2455.501571] ? vmx_vcpu_run+0x3a73/0x5bb0 [ 2455.507639] ------------[ cut here ]------------ [ 2455.512099] ? vmx_vcpu_run+0x3a67/0x5bb0 [ 2455.516127] downgrading a read lock [ 2455.516208] WARNING: CPU: 1 PID: 3308 at kernel/locking/lockdep.c:3556 lock_downgrade+0x4d7/0x900 [ 2455.524288] ? vmx_vcpu_run+0x3a73/0x5bb0 [ 2455.529803] Kernel panic - not syncing: panic_on_warn set ... [ 2455.534537] ? vmx_vcpu_run+0x3a67/0x5bb0 [ 2455.697854] ? vmx_vcpu_run+0x3a73/0x5bb0 [ 2455.701987] ? vmx_vcpu_run+0x3a67/0x5bb0 [ 2455.706145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2455.711676] ? __vmx_complete_interrupts+0x1ed/0x3d0 [ 2455.716769] ? vmx_vcpu_run+0x935/0x5bb0 [ 2455.720827] ? lock_acquire+0x1ed/0x520 [ 2455.724789] ? kvm_arch_vcpu_ioctl_run+0x3c71/0x72a0 [ 2455.729879] ? kvm_arch_vcpu_ioctl_run+0x3c05/0x72a0 [ 2455.734974] ? lock_release+0xa00/0xa00 [ 2455.738944] ? trace_hardirqs_on+0xbd/0x310 [ 2455.743258] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 2455.747504] ? check_preemption_disabled+0x48/0x280 [ 2455.752510] ? check_preemption_disabled+0x48/0x280 [ 2455.757517] kvm_arch_vcpu_ioctl_run+0x3ded/0x72a0 [ 2455.762452] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 2455.767285] ? __lock_acquire+0x62f/0x4c20 [ 2455.771510] ? lock_downgrade+0x900/0x900 [ 2455.775657] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2455.780851] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2455.785945] ? futex_wake+0x304/0x760 [ 2455.789750] ? __lock_acquire+0x62f/0x4c20 [ 2455.793981] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2455.799517] ? mark_held_locks+0x130/0x130 [ 2455.803740] kvm_vcpu_ioctl+0x5c8/0x1150 [ 2455.807787] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 2455.812018] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 2455.817720] ? find_held_lock+0x36/0x1c0 [ 2455.821773] ? __fget+0x4aa/0x740 [ 2455.825215] ? check_preemption_disabled+0x48/0x280 [ 2455.830228] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2455.835145] ? kasan_check_read+0x11/0x20 [ 2455.839279] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2455.844543] ? rcu_softirq_qs+0x20/0x20 [ 2455.848512] ? __fget+0x4d1/0x740 [ 2455.851963] ? ksys_dup3+0x680/0x680 [ 2455.855671] ? __might_fault+0x12b/0x1e0 [ 2455.859745] ? lock_downgrade+0x900/0x900 [ 2455.863888] ? lock_release+0xa00/0xa00 [ 2455.867855] ? perf_trace_sched_process_exec+0x860/0x860 [ 2455.873311] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 2455.879011] do_vfs_ioctl+0x1de/0x1790 [ 2455.882891] ? ioctl_preallocate+0x300/0x300 [ 2455.887286] ? __fget_light+0x2e9/0x430 [ 2455.891252] ? fget_raw+0x20/0x20 [ 2455.894698] ? _copy_to_user+0xc8/0x110 [ 2455.898667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2455.904197] ? put_timespec64+0x10f/0x1b0 [ 2455.908337] ? nsecs_to_jiffies+0x30/0x30 [ 2455.912479] ? do_syscall_64+0x9a/0x820 [ 2455.916451] ? do_syscall_64+0x9a/0x820 [ 2455.920416] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2455.924995] ? security_file_ioctl+0x94/0xc0 [ 2455.930006] ksys_ioctl+0xa9/0xd0 [ 2455.933463] __x64_sys_ioctl+0x73/0xb0 [ 2455.937343] do_syscall_64+0x1b9/0x820 [ 2455.941222] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2455.946575] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2455.951493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2455.956347] ? trace_hardirqs_on_caller+0x310/0x310 [ 2455.961357] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2455.966363] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2455.971371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2455.976209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2455.981385] RIP: 0033:0x457569 [ 2455.984572] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2456.003461] RSP: 002b:00007f87da7bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2456.011158] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 2456.018414] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000000a [ 2456.025679] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2456.032940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f87da7bf6d4 [ 2456.040195] R13: 00000000004c034e R14: 00000000004d0d60 R15: 00000000ffffffff [ 2456.047478] Modules linked in: [ 2456.051882] Kernel Offset: disabled [ 2456.055504] Rebooting in 86400 seconds..