r_ioctl+0x2b/0x40 [ 386.500738][T28098] do_vfs_ioctl+0xdb6/0x13e0 [ 386.500759][T28098] ? ioctl_preallocate+0x210/0x210 [ 386.500772][T28098] ? __fget+0x384/0x560 [ 386.500792][T28098] ? ksys_dup3+0x3e0/0x3e0 [ 386.511209][T28098] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.511227][T28098] ? fput_many+0x12c/0x1a0 [ 386.511251][T28098] ? tomoyo_file_ioctl+0x23/0x30 [ 386.511265][T28098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.511278][T28098] ? security_file_ioctl+0x8d/0xc0 [ 386.511295][T28098] ksys_ioctl+0xab/0xd0 [ 386.511312][T28098] __x64_sys_ioctl+0x73/0xb0 [ 386.511331][T28098] do_syscall_64+0xfd/0x6a0 [ 386.511352][T28098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.521637][T28098] RIP: 0033:0x4597c9 [ 386.521661][T28098] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.521669][T28098] RSP: 002b:00007fc912bfbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 386.521684][T28098] RAX: ffffffffffffffda RBX: 00007fc912bfbc90 RCX: 00000000004597c9 [ 386.521694][T28098] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000004 [ 386.521702][T28098] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 386.521710][T28098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc912bfc6d4 [ 386.521718][T28098] R13: 00000000004c4252 R14: 00000000004d81f8 R15: 0000000000000005 [ 386.528347][T28099] UBIFS error (pid: 28099): cannot open "./file0", error -22 08:44:32 executing program 3 (fault-call:3 fault-nth:22): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='%bifs\x00', 0x0, 0x0) 08:44:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef2408000000129386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x2, 0x0) 08:44:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 387.251116][T28266] FAULT_INJECTION: forcing a failure. [ 387.251116][T28266] name failslab, interval 1, probability 0, space 0, times 0 08:44:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef2408000000139386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 387.303149][T28232] XFS (loop0): Mounting V4 Filesystem [ 387.308452][T28266] CPU: 1 PID: 28266 Comm: syz-executor.3 Not tainted 5.2.0-rc7-next-20190701 #26 [ 387.317801][T28266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.327894][T28266] Call Trace: [ 387.331212][T28266] dump_stack+0x172/0x1f0 [ 387.335574][T28266] should_fail.cold+0xa/0x15 [ 387.340192][T28266] ? fault_create_debugfs_attr+0x180/0x180 [ 387.346028][T28266] ? ___might_sleep+0x163/0x280 [ 387.350902][T28266] __should_failslab+0x121/0x190 [ 387.355739][T28232] XFS (loop0): empty log check failed [ 387.355852][T28266] should_failslab+0x9/0x14 [ 387.365718][T28266] kmem_cache_alloc_node_trace+0x274/0x750 [ 387.368882][T28232] XFS (loop0): log mount/recovery failed: error -5 [ 387.371543][T28266] __kmalloc_node_track_caller+0x3d/0x70 [ 387.371571][T28266] __kmalloc_reserve.isra.0+0x40/0xf0 [ 387.389044][T28266] __alloc_skb+0x10b/0x5e0 [ 387.393477][T28266] ? netdev_alloc_frag+0x1b0/0x1b0 [ 387.398602][T28266] ? kobject_uevent_env+0x387/0x1023 [ 387.404072][T28266] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.404095][T28266] alloc_uevent_skb+0x83/0x1e2 [ 387.404115][T28266] ? netdev_queue_attr_store+0x80/0x80 [ 387.404134][T28266] kobject_uevent_env+0xbdc/0x1023 [ 387.414613][T28266] kobject_uevent+0x20/0x26 [ 387.414632][T28266] netdev_queue_update_kobjects+0x2ff/0x3d0 [ 387.414668][T28266] netif_set_real_num_tx_queues+0x1c2/0x720 [ 387.429707][T28266] tun_attach+0x520/0x1470 [ 387.429743][T28266] __tun_chr_ioctl+0x1ed4/0x3ef0 [ 387.429765][T28266] ? tun_select_queue+0x7f0/0x7f0 [ 387.441532][T28266] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 387.441547][T28266] ? __f_unlock_pos+0x19/0x20 [ 387.441579][T28266] ? tun_chr_compat_ioctl+0x30/0x30 [ 387.441594][T28266] tun_chr_ioctl+0x2b/0x40 [ 387.441611][T28266] do_vfs_ioctl+0xdb6/0x13e0 [ 387.441630][T28266] ? ioctl_preallocate+0x210/0x210 [ 387.441648][T28266] ? __fget+0x384/0x560 [ 387.489933][T28266] ? ksys_dup3+0x3e0/0x3e0 [ 387.494366][T28266] ? tomoyo_file_ioctl+0x23/0x30 [ 387.499313][T28266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.505561][T28266] ? security_file_ioctl+0x8d/0xc0 [ 387.510678][T28266] ksys_ioctl+0xab/0xd0 [ 387.514839][T28266] __x64_sys_ioctl+0x73/0xb0 [ 387.519441][T28266] do_syscall_64+0xfd/0x6a0 [ 387.523946][T28266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.529835][T28266] RIP: 0033:0x4597c9 [ 387.533724][T28266] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:44:32 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x8000, 0x0) [ 387.553325][T28266] RSP: 002b:00007fc912c1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 387.561738][T28266] RAX: ffffffffffffffda RBX: 00007fc912c1cc90 RCX: 00000000004597c9 [ 387.569723][T28266] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000004 [ 387.577695][T28266] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 387.585667][T28266] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc912c1d6d4 [ 387.593729][T28266] R13: 00000000004c4252 R14: 00000000004d81f8 R15: 0000000000000005 08:44:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='\\bifs\x00', 0x0, 0x0) [ 387.629841][T28232] XFS (loop0): log mount failed 08:44:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef2408000000149386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 387.759544][T28339] XFS (loop1): Mounting V4 Filesystem 08:44:33 executing program 3 (fault-call:3 fault-nth:23): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 387.857565][T28339] XFS (loop1): empty log check failed [ 387.894431][T28339] XFS (loop1): log mount/recovery failed: error -5 08:44:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='u\\ifs\x00', 0x0, 0x0) [ 387.970208][T28339] XFS (loop1): log mount failed [ 387.987571][T28443] FAULT_INJECTION: forcing a failure. [ 387.987571][T28443] name failslab, interval 1, probability 0, space 0, times 0 [ 388.010693][T28443] CPU: 0 PID: 28443 Comm: syz-executor.3 Not tainted 5.2.0-rc7-next-20190701 #26 [ 388.019837][T28443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.029900][T28443] Call Trace: [ 388.033231][T28443] dump_stack+0x172/0x1f0 [ 388.037566][T28443] should_fail.cold+0xa/0x15 [ 388.042163][T28443] ? fault_create_debugfs_attr+0x180/0x180 [ 388.047973][T28443] ? ___might_sleep+0x163/0x280 [ 388.052829][T28443] __should_failslab+0x121/0x190 [ 388.057765][T28443] should_failslab+0x9/0x14 [ 388.062267][T28443] __kmalloc_track_caller+0x2dc/0x760 [ 388.067637][T28443] ? pointer+0x750/0x750 [ 388.071896][T28443] ? lock_downgrade+0x920/0x920 [ 388.076749][T28443] ? kvasprintf_const+0x65/0x190 [ 388.081700][T28443] kvasprintf+0xc8/0x170 [ 388.085949][T28443] ? bust_spinlocks+0xe0/0xe0 [ 388.090635][T28443] ? mark_held_locks+0xa4/0xf0 [ 388.095402][T28443] ? kfree+0x226/0x2c0 [ 388.099469][T28443] ? kobject_uevent_env+0xfc2/0x1023 [ 388.104765][T28443] ? kfree+0x226/0x2c0 [ 388.108840][T28443] kvasprintf_const+0x65/0x190 [ 388.113606][T28443] kobject_set_name_vargs+0x5b/0x150 [ 388.118897][T28443] kobject_init_and_add+0xc9/0x160 [ 388.124005][T28443] ? kobject_add_internal+0x380/0x380 [ 388.129382][T28443] ? kobject_uevent+0x20/0x26 [ 388.134055][T28443] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 388.139777][T28443] net_rx_queue_update_kobjects+0x1d3/0x470 [ 388.145676][T28443] ? netif_set_real_num_tx_queues+0x10c/0x720 [ 388.151749][T28443] netif_set_real_num_rx_queues+0x16e/0x210 [ 388.157647][T28443] tun_attach+0x57d/0x1470 [ 388.162081][T28443] __tun_chr_ioctl+0x1ed4/0x3ef0 [ 388.167023][T28443] ? tun_select_queue+0x7f0/0x7f0 [ 388.172050][T28443] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 388.177857][T28443] ? __f_unlock_pos+0x19/0x20 [ 388.182547][T28443] ? tun_chr_compat_ioctl+0x30/0x30 [ 388.187739][T28443] tun_chr_ioctl+0x2b/0x40 [ 388.192161][T28443] do_vfs_ioctl+0xdb6/0x13e0 [ 388.196751][T28443] ? ioctl_preallocate+0x210/0x210 [ 388.201891][T28443] ? __fget+0x384/0x560 [ 388.208518][T28443] ? ksys_dup3+0x3e0/0x3e0 [ 388.212934][T28443] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 388.219173][T28443] ? fput_many+0x12c/0x1a0 [ 388.223594][T28443] ? tomoyo_file_ioctl+0x23/0x30 [ 388.228529][T28443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.234852][T28443] ? security_file_ioctl+0x8d/0xc0 [ 388.239973][T28443] ksys_ioctl+0xab/0xd0 [ 388.244129][T28443] __x64_sys_ioctl+0x73/0xb0 [ 388.248722][T28443] do_syscall_64+0xfd/0x6a0 [ 388.253233][T28443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.259124][T28443] RIP: 0033:0x4597c9 [ 388.263017][T28443] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.282671][T28443] RSP: 002b:00007fc912c1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 388.291086][T28443] RAX: ffffffffffffffda RBX: 00007fc912c1cc90 RCX: 00000000004597c9 [ 388.299071][T28443] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000004 [ 388.307047][T28443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:44:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='security&)vmnet1vboxnet0\x00', &(0x7f00000000c0)='ppp0@-trusted-\x00'], &(0x7f0000000180)=[&(0x7f0000000140)='ubifs\x00']) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 388.315112][T28443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc912c1d6d4 [ 388.323087][T28443] R13: 00000000004c4252 R14: 00000000004d81f8 R15: 0000000000000005 [ 388.345124][T28443] kobject: can not set name properly! 08:44:33 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef2408000000159386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:33 executing program 3 (fault-call:3 fault-nth:24): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x42) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x70, "5279edd7757f67424afdbc0d9ab505d5ccc4e6d6e1b01b387cac7903f0e92b74c485e4a10131a7319f349697361c51a77fa54fbb070d55e2cccea69c3b2eae5334305ee6c2b099d6eae69facda7e739e2dca412c2651361733627d0cd36eade69d17eb5a553c4b12af72f7ad7c298598"}, &(0x7f0000000100)=0x78) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x80) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0xffffffffffff621c}, 0x8) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ub%fs\x00', 0x0, 0x0) [ 388.744903][T28580] XFS (loop0): Mounting V4 Filesystem 08:44:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef2408000000169386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 388.791895][T28594] FAULT_INJECTION: forcing a failure. [ 388.791895][T28594] name failslab, interval 1, probability 0, space 0, times 0 [ 388.815247][T28580] XFS (loop0): empty log check failed [ 388.829475][T28580] XFS (loop0): log mount/recovery failed: error -5 [ 388.909310][T28594] CPU: 0 PID: 28594 Comm: syz-executor.3 Not tainted 5.2.0-rc7-next-20190701 #26 [ 388.918470][T28594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.928534][T28594] Call Trace: [ 388.931842][T28594] dump_stack+0x172/0x1f0 [ 388.936187][T28594] should_fail.cold+0xa/0x15 [ 388.940791][T28594] ? fault_create_debugfs_attr+0x180/0x180 [ 388.946608][T28594] ? ___might_sleep+0x163/0x280 [ 388.951483][T28594] __should_failslab+0x121/0x190 [ 388.956437][T28594] should_failslab+0x9/0x14 [ 388.960945][T28594] __kmalloc_track_caller+0x2dc/0x760 [ 388.966320][T28594] ? find_held_lock+0x35/0x130 [ 388.971104][T28594] ? kasan_check_read+0x11/0x20 [ 388.975956][T28594] ? kstrdup_const+0x66/0x80 [ 388.980549][T28594] kstrdup+0x3a/0x70 [ 388.984444][T28594] kstrdup_const+0x66/0x80 [ 388.988861][T28594] __kernfs_new_node+0xb1/0x6c0 [ 388.993722][T28594] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 388.999188][T28594] ? __put_user_ns+0x70/0x70 [ 389.003785][T28594] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 389.010024][T28594] ? irq_work_queue+0x30/0x90 [ 389.014702][T28594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.020953][T28594] kernfs_new_node+0x96/0x120 [ 389.025633][T28594] kernfs_create_dir_ns+0x52/0x160 [ 389.030754][T28594] sysfs_create_dir_ns+0x136/0x290 [ 389.035861][T28594] ? sysfs_create_mount_point+0xa0/0xa0 [ 389.041414][T28594] kobject_add_internal.cold+0x116/0x662 [ 389.047050][T28594] kobject_init_and_add+0x101/0x160 [ 389.052250][T28594] ? kobject_add_internal+0x380/0x380 [ 389.057625][T28594] ? kobject_uevent+0x20/0x26 [ 389.062318][T28594] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 389.068042][T28594] net_rx_queue_update_kobjects+0x1d3/0x470 [ 389.073940][T28594] ? netif_set_real_num_tx_queues+0x10c/0x720 [ 389.080012][T28594] netif_set_real_num_rx_queues+0x16e/0x210 [ 389.085906][T28594] tun_attach+0x57d/0x1470 [ 389.090346][T28594] __tun_chr_ioctl+0x1ed4/0x3ef0 [ 389.095288][T28594] ? tun_select_queue+0x7f0/0x7f0 [ 389.100311][T28594] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 389.106225][T28594] ? __f_unlock_pos+0x19/0x20 [ 389.110921][T28594] ? tun_chr_compat_ioctl+0x30/0x30 [ 389.116129][T28594] tun_chr_ioctl+0x2b/0x40 [ 389.120636][T28594] do_vfs_ioctl+0xdb6/0x13e0 [ 389.125235][T28594] ? ioctl_preallocate+0x210/0x210 [ 389.130345][T28594] ? __fget+0x384/0x560 [ 389.134500][T28594] ? ksys_dup3+0x3e0/0x3e0 [ 389.138919][T28594] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 389.145157][T28594] ? fput_many+0x12c/0x1a0 [ 389.149589][T28594] ? tomoyo_file_ioctl+0x23/0x30 [ 389.154544][T28594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.160778][T28594] ? security_file_ioctl+0x8d/0xc0 [ 389.165982][T28594] ksys_ioctl+0xab/0xd0 [ 389.170151][T28594] __x64_sys_ioctl+0x73/0xb0 [ 389.174750][T28594] do_syscall_64+0xfd/0x6a0 [ 389.179269][T28594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.185155][T28594] RIP: 0033:0x4597c9 [ 389.189046][T28594] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:44:34 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000008002, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x83) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x3fffe, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/190, 0xbe) 08:44:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ub\\fs\x00', 0x0, 0x0) [ 389.209181][T28594] RSP: 002b:00007fc912c1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 389.217593][T28594] RAX: ffffffffffffffda RBX: 00007fc912c1cc90 RCX: 00000000004597c9 [ 389.225564][T28594] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000004 [ 389.233631][T28594] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 389.241604][T28594] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc912c1d6d4 [ 389.249573][T28594] R13: 00000000004c4252 R14: 00000000004d81f8 R15: 0000000000000005 [ 389.319227][T28580] XFS (loop0): log mount failed 08:44:34 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rfcomm\x00') epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x10000000}) fremovexattr(r0, &(0x7f0000000040)=@known='com.apple.FinderInfo\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubi%s\x00', 0x0, 0x0) 08:44:34 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 389.621768][T28594] kobject_add_internal failed for rx-1 (error: -12 parent: queues) 08:44:35 executing program 4: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9305dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubi.s\x00', 0x0, 0x0) 08:44:35 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0x4, 0x6}, {0x0, 0x8}, 0x7, 0x0, 0x3}) rmdir(&(0x7f0000000100)='./file0\x00') 08:44:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a02000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 390.221248][T29041] XFS (loop1): Mounting V4 Filesystem 08:44:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x2, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 390.304993][T29041] XFS (loop1): empty log check failed 08:44:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubi/s\x00', 0x0, 0x0) [ 390.348300][T29041] XFS (loop1): log mount/recovery failed: error -5 08:44:35 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffff, 0x10000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) [ 390.479112][T29041] XFS (loop1): log mount failed 08:44:35 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a30000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubi\\s\x00', 0x0, 0x0) 08:44:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x10, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:36 executing program 1: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff0f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:36 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x1, 0x51) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x6) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6af0000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:36 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif#\x00', 0x0, 0x0) 08:44:36 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0\x00', r0, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='affs\x00', 0x0, 0x0) 08:44:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x5421, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:36 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 391.307520][T29408] XFS (loop1): Mounting V4 Filesystem 08:44:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00300000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif%\x00', 0x0, 0x0) [ 391.395821][T29408] XFS (loop1): empty log check failed [ 391.404268][T29408] XFS (loop1): log mount/recovery failed: error -5 [ 391.503283][T29408] XFS (loop1): log mount failed 08:44:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005340)='/dev/vsock\x00', 0x2e0803, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005380)={{{@in=@empty, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x6, 0x694}) fcntl$notify(r0, 0x402, 0x80000008) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000054c0)={@mcast1, @ipv4={[], [], @broadcast}, @loopback, 0x8, 0x7, 0x6, 0x100, 0x4, 0x2000000, r1}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x5450, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:37 executing program 1: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff0f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif*\x00', 0x0, 0x0) 08:44:37 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a003f0000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x4000c2, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000080)={0xe, 0x0, {0x55, 0x2, 0x4, {0x6, 0x8}, {0x0, 0x4d5fc898}, @cond=[{0x1, 0x5, 0x34, 0x5, 0x2, 0x400}, {0x6, 0x2, 0x5, 0x0, 0x723f1937, 0x1}]}, {0x52, 0x0, 0x0, {0x4, 0x5}, {0xfffffffffffffffd, 0x81}, @cond=[{0x1f, 0x2e3, 0x3, 0x7aca, 0x1f, 0x2}, {0x8, 0x401, 0x0, 0x7ff, 0x1, 0x1}]}}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x5451, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif+\x00', 0x0, 0x0) 08:44:37 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00400000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$sock(r0, &(0x7f0000002980)=[{{&(0x7f0000000080)=@in={0x2, 0x4e23, @empty}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)="77a1d6ddf6a8092d718683181e725b53b1e203c9fa19321c38c99a64575afceaae71edcf890eaf0be9b34a1a4bb52fe5e9635d19ce60e23b39223f7dc0f75705c321e1ecab61f875078d99203fe46af3d08d72deb13a20285a49c17c91bf71c8c48ec3bd794c8cf8ffd0b6f07e3eaee12c13dfcd9f6530a025563db8228aa884b1cdfaa36bd4bf78d7c3a972d5121c5ba042048370531aff2b3271cd820f7b5ab9b6dd9ff0e38ee0c1fe4ee6d88b2045d0561f7ee2219532b6040ab047beebf8e8ade8f0809cd2f4293ce219dd993c21f60f971be307ee0b3f21b6e84626ce35ba14", 0xe2}, {&(0x7f00000002c0)="3edd44c21436b1ccb118f02743a5ebb1dc98053d87817dcedc42100cea4a57d421e055f1ff0321d7fde01a9e463e461a31700ee06efb280e3acbbba6f8b3ee1d6f9169ad6eb60132498996831bd3b9cb989fe2e34a707aa8d713892089a26a7661ae841b6658b00a8a45ac0eb346a4cdac49b06b482bf8a3f6a9b8337f280020b70df122a96923c78891642ece0e401009eae7f0e3c29cbd7e18a82795ccd08534e3e456235440b0c501e5ae57f8cd", 0xaf}, {&(0x7f0000000380)="7879e87863aa5f77f84ac6c186cf8168e1a306ea6d0486b9b28266e25a7eca34d4981cedfc7ea45e907466d62335bf2f78448340e95a085506a0788618fcead530dfe99d", 0x44}, {&(0x7f0000000400)="e66eab6baf310cbf4b66c49cc60abad4168013f3314d885a2da7077b4eabeca9c8b8321cf91e9e0503ccafbd37fcff12401924e7b5759ebc5f6da95c178d1f45e2d1f6c82d4c581985d316ad0905adc218888286ee4864836927db47453f9a0c2fd49a2ca5254f6728532fe4ac", 0x6d}, {&(0x7f0000000480)="b140633659c6b0367c9862173b3703666cbc4ee4913c4dd7d9ba37ef614a6aff495b9a3649231952d445babd0dc17ec4733fd61b9d974fbf15d39a3afd0e51ec63020c85ae9a30676f1d0795a1143807cac4069043a32f76744c051208b84714534786bca573c1efa9c32a64827c2d754e7d4046245ba60bc233a44e0d6c3a2c858ba454", 0x84}, {&(0x7f0000000540)="666055cf813b6273038c06d39a1bf2edbb62acf4885c73dbf5c887b1b0ee208427bf76983569481a362fcf37f1932131163beea5556227370def980f529bdb3f3337bad0b96d7fbaeb0b29c70cd7351270b189a98c76f4265c67d8e18ee411544625c5f4cd964f2c7cf7d29cbfa09d8741c72b3c11f811f1b3fd57183f175602e86c66dbb1617aef", 0x88}], 0x6, &(0x7f0000000680)=[@txtime={{0x18, 0x1, 0x3d, 0x20}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x200}}], 0x90}}, {{&(0x7f0000000740)=@nfc={0x27, 0x1, 0x1, 0x6}, 0x80, &(0x7f0000000200)=[{&(0x7f00000007c0)="6475838bafef25fcdfec8b835f45ac9f7db4d8784d3511507827e094310aacaef1cd86c7aebcc52bcee1cc6c94884a05beda7d4c4f87346590f2b21667eacaea53d5ad207024b9aa6b4bb67923c2ec2875e83b5ecc6899f13133db946dec06d252ee124d7236bda1ed08627d83a36eced3e8b136194b11ec65ebd30a9351e0cb969d63ffe676d19b6fac7c3d10a3c88710f1aba14d24d31fe7a0917347544f610dcb134490bff0d19fade961bbd7502442fc0bc6ce0d29f7b4e9cfa78bbde5bbb96b3074115eb55b05b41b2313ad618d3078b9a5e0222ceb47fd35caaff3585917b677d331d9", 0xe6}, {&(0x7f00000008c0)="91fc683137c5319dbe3d75429789eafbd297c8f8b1594c3addf623ffce25d05943d1ddc91ed12a98a5d9b9e576a05c79774fa2bf9749120c3a02bd0a8982e92a325ecff67b75acf74c67bd10d2d618ff139c897a55060f79fdb199e9e6d7f47a638ced14763cb64d56e132cf0a55211a89524b1b38faf4f23aefcba2709710657d38ee9d25331b259974cef3e5f7ad4bb133c70000d0e41d5129f85a75f11daf99902218ff8c0d502142b8335cfe37fbc47bfe797317cb1417c446bd40128e8294941acfba2f452a947cc333b144179116461ecb03f186531234fd59ef3f3f32a38e2409b2f5f2ab527a830fed9de893c085d5", 0xf3}], 0x2, &(0x7f00000009c0)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x60}}, {{&(0x7f0000000a40)=@isdn={0x22, 0x6, 0x9, 0x9, 0x1}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000000ac0)="0aa20c4992f5353a56d10d3cbf1e833f440e30c056d08647135d30e8e710b5dad2cc2d93183d8fe8b5f73fcfe55b90e76500ab67e6a0b6e2776481d381c70d48ba600f6b70575a6e5217c696738197a2ba5ca02cd0e19122f507340ea50db191c7d877a9cbb23d00b3c00f37461269f949d425e8ac61228bb810c68f171dc7504b058ebf9a9d787f8eda820f61b0f70ce2e9e0e3fd42b2dced066a83b13d9fc0659b8cb4507591ae573243c25e290106d68d81333ce2eefaf153321ff493c9c23a", 0xc1}, {&(0x7f0000000bc0)="05484d486bdba42a06ae2176e97d8c900e5160f9e0880d940ffd95795919783e44fb8dea50361c3d2d44ef169006277fd43428c5a814cd78d41a41a14fa6a63e3436290a3fd7d3b481cf9a66a6c55c7879060794f0b2d7c257e33130a0d13ea97afcb0a874fea52e1eb2bfa9322be3", 0x6f}, {&(0x7f0000000c40)="6e696c7bebd1cc4e8dc8ad979d69a55ce34d6c6260536a4ac0bea1069bec619357299322700968504bb674e5f546058ac707c25180ab5d47cc49dadae5b2ac89bcc7839deb42961608e56ef6cb72506a72f561d010da2ba1981c565b7e8c7034865f568354e69c4fc56e49983636c42f12bd310f20f3d5fd59d7ba5a8ec6a41c1701466798c1fb4cc6273af1b31ba80bd6d4f29f9ee352bb94c9921eef1699fda2c23a888b3eba28c62103f7cdadd2c685bdf71883d2100d760990252e8f028ab9cefcdfb8b0d24814a946d530bcfb9767d90ac0a6e3bef2e64593d5f9b972318f18497f097643a6d84c5c", 0xeb}, {&(0x7f0000000d40)="f2fc16f431d94597472d74c399ed6999e84079c7dd119b77d5e0f264c3e7ecd47a11a3b1963766a357954c0f2cefc00dc5a273c26b38148862130bca61ae502ee197ceadfaa15e3027eb8f8fc4a4a64b168bd2da65f33a67bc13219f15086efdef3b7172bfc36cd09e26fd6ee61a5db212064ce959e2a491a139ea527d66c6efe3caa2d9761d19c76834f27fcbeac40718565107c5651dc500878e20b032035a79e21dcbc1559fded4654510fb5f", 0xae}, {&(0x7f0000000e00)="cb968ee5b82eb6011a0bdfcf21dd8ab3127d319dbd98eceeb235a80ae3dacbf085a372c3629c350fafcddca41dda7e059339100040a116d9d44eea37c8096c9fea92592c3ce09a7687b420175844fe01c07afaf4eea91024651cc2c9e8297f0053f6f77d3f6e5594dca6cedd122bae94762bc9fdfa4ec9bbc4f7836aeb", 0x7d}, {&(0x7f0000000e80)="a2d74cc663af3abe98", 0x9}, {&(0x7f0000000ec0)="d22df544eeadb3993eec9557fc7ab290bd26ca34e92bbf5fd163b614591c3060034d2047c73446d90a2158197bbc54caf9ec79e95ea4deedaa94381e2beeab068384020ff653b84cba360edc62f78c58195227833bf436fce7268218b3ea6665c030ca92df5d135945117b0dcdd069fb95e4afe336a9a068ad9836f4dd4ab406c7d12bc9efc0f85ff5935a589936623a4ead4ebe3a71d4b4f2a3353cb3217e4141199ffa0343d481e45571326987883633e47e9b1c", 0xb5}, {&(0x7f0000000f80)="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", 0x1000}, {&(0x7f0000001f80)="642c42f94c2cfdb4dd10bdd235c1555521ef3daf9685a78313947f9072e6c9f54dc2ce138d", 0x25}], 0x9, &(0x7f0000002080)=[@timestamping={{0x14, 0x1, 0x25, 0xc8eb}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffff3e}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0xa8}}, {{&(0x7f0000002140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x2, 0x2, 0x1, {0xa, 0x4e22, 0x80, @mcast2, 0x3}}}, 0x80, &(0x7f0000002640)=[{&(0x7f00000021c0)="8b6157bf6ea8744393156e3e356665ddf9ce7fa7a7ac2f8ca8f684235c2d9635c01250fe531d", 0x26}, {&(0x7f0000002200)="4549a215c22a7475fdc0ae50550e493440fccf47c88f3f40546f7a637f9ad247527225d76bbf432472abb2352346f3ad0a1a36fa12dc3f", 0x37}, {&(0x7f0000002240)="72f6c76dc068fa19922c6d5006fce159f3b38808704eacc1bb46e091aea1593ec72a2c027fb8e8c0dcfc22e96c96eefbccfabef9582c646336efe34d60044fb6de1917d26458cb39bedd61016be6800eae2894cf0edc30dba96775712f15177d72dcd56e4a493424083c3eba039b7d247de7765002f398fc607d645965d9ad60e50d24fa6f79bfa2e9829e0bf7670bac973cd62dfdcc1c8c5c881f228d0bbafca1fc4c1aa038e81920e86aa016a188958614ef982b471843c5f0f1cb45ab5d2cc4a7b649d410ade2ed5be560a9e056e33fafbc1a8b83a95dfb4e5eccda3b8471", 0xe0}, {&(0x7f0000002340)="996c1c02378a822a89c13a2961831efdc2be992f82729f4c8087d380da33d928797622ec0c16523366ee9aa54e9cece65b9520653aa85533cdf4758c6185b763c2b00df36cb707916b30084523bb1ac02b4c778b256ea724e2f8933f925c4f9075e6580e3947e32135b947f98146397e4f7d60fc3de588df4bb05bea146631a37165e001bb311b8cd99d710e64aa7091b37f081b6ae55d9260aa414b14aa256b89e482830be32a73b11c33ec3a0d0c263e535659cbb2820d69efceebed973cb02af0941203b5175022d9534ffec2e94d82246844", 0xd4}, {&(0x7f0000002440)="70393e52517de4b98eb1bfb2ed12cd11de81f7cb6f6590a9ffc2e9fd70e94261891c63f3f61459e1d18183edb9b5bac2010728bab786348e90c2a41f45820cef9051152292e8d02c924155d4076db8d804297a55532881e009b5226da70f6943e9682600eba3a2b9b23d93db6a07506a80a743f1363bb1dbc6acf7f00ac3b37f97d1ab8477bf873ab493729feab1fdda6668066b3ff2c780958322f07244335abf60a5c9276c780ea63eb7787a8f6953d9e54891b4dec7ef3913bf12a1bd0212ad3b7bf7b0d68fd672116c68c9f8660847fef6993c170f691ec4b548e5bafac678d3b56be9cb5424df8b971f8f18a8138378", 0xf2}, {&(0x7f0000002ac0)="99162c0cbf07216fbc6a2a898038f1d0c2db975798cc588d4c61cead73d4bc77cf655a0990a458ae4e8f316b435aa52c5573b4a46e3ba89f5a6be06c80846ea08d50300ece4d9f7a153edae58e13e2b7588280a930fb8d39666a7790a7f39db818fdc0c5be886e18cd5daaa34ad5d88217cf3829dec5cf4f946b4ea492497de32a525ed43dc13d386555af375ae3c7636116857433c9f9279545de09580bd4e6fbde85fd732ca1215c50495bed3b874672ccf0f90ca60ffc889767c0adfa4a18c4585f6a3c5f1cb222e49d20cd5bd4f23a952bb1e921b37e59c4947ddd", 0xdd}], 0x6}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f00000026c0)="bf", 0x1}, {&(0x7f0000002700)="389f8bea4091362b99669fde041cc3812d9d1bfb311aafed3004d2735deb935c75a1885e33d43b8444cbba9e71a009dda1d7f60427f247557b326c4ad6a0e7c273aaf32e58b420d021f4d0e3ee132863917802e3877747e03a619af3f7c5957452dd794a5c4f6f5c38ca015bff6260a22f2d8efdbee262e17941cf03cd9940b1c858dbb1cef9451b9cd18b7185", 0x8d}, {&(0x7f00000027c0)="e5df3c2b9b16453d12c1cffa13dc36b991f6f56b07863f913d0b23e0572b7af3f32856b65f149a4d97f0a74819520e7c3484d6301f7b9dbdb72770c65348340fda355573d6428eafc852d5a51b794e1f65cc80cfe7aee5eeba7d0a9cfe17c924038d644564bf9210a3155cd7a9d92b7632d85b652862ba80a3a6a5e2745e73a9", 0x80}, {&(0x7f0000002840)="f3f1acd128f3", 0x6}, {&(0x7f0000002880)="01f48e08b5885c7ca1fb421b663fab112bd66622c6c87b6ea6c4881a4c3304cd5d8442", 0x23}], 0x5, &(0x7f0000002940)=[@mark={{0x14, 0x1, 0x24, 0x7}}], 0x18}}], 0x5, 0x8844) [ 392.298205][T29681] XFS (loop1): Mounting V4 Filesystem [ 392.350281][T29681] XFS (loop1): empty log check failed [ 392.378783][T29681] XFS (loop1): log mount/recovery failed: error -5 08:44:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif-\x00', 0x0, 0x0) 08:44:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x5452, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 392.459099][T29681] XFS (loop1): log mount failed [ 392.567863][T29791] XFS (loop0): Invalid superblock magic number 08:44:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff0f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00f00000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000740)='gfs2meta\x00', 0x402, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x20000, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=@del={0x108, 0x11, 0x0, 0x70bd29, 0x25dfdbfd, {{'drbg_nopr_ctr_aes256\x00'}, [], [], 0x2400, 0x2000}, [{0x8, 0x1, 0x10000}, {0x8, 0x1, 0x1ff}, {0x8, 0x1, 0x1ff}, {0x8, 0x1, 0x100000000}, {0x8, 0x1, 0x3f}]}, 0x108}, 0x1, 0x0, 0x0, 0x4}, 0x20008000) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x20000, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4000, &(0x7f0000000880)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64303030303034303030302c757365725f69643d000000000000000000000000000000908fa2a45bd9801f779a59f5cf1c64f8a973d82e4358d06923d4c379b9e3cd72a2e1af1f35459241012f0eba00ddcfeff76143255a054e484436bd27ba96c9892e81183057e320ec30b85cdace847d62a8fe3a6b8c166ca84d085c8b5bd80c4f8ec81b873574e7d959c530c1deb5b415c7c27a5757b587a858de54840fa299a26a0c3f666eaedcf6f51e326347d1c3", @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,fowner>', @ANYRESDEC=r4, @ANYBLOB=',\x00']) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x10002, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000780)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0xff, 0xffffffff, 0x7, 0x9, 0x3e3, 0x5, 0xffffffff, 0x78407758, 0x737, 0x40, 0x0, 0xc133, 0x6, 0x9, 0x1]}, &(0x7f0000000680)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000006c0)={0x80, 0x5, 0x0, 0xfffffffffffffff9, 0x1, 0x5, 0x3, 0x0, r6}, 0x20) 08:44:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif.\x00', 0x0, 0x0) 08:44:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x5460, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:38 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif/\x00', 0x0, 0x0) 08:44:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x10000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001300)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001340)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001440)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001540)='eth0)eth1\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000015c0)={{{@in6=@ipv4, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000016c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = epoll_create(0x5) r8 = syz_open_dev$cec(&(0x7f0000001780)='/dev/cec#\x00', 0x3, 0x2) r9 = syz_open_dev$vcsn(&(0x7f00000017c0)='/dev/vcs#\x00', 0x12f2, 0x2a000) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001800)={0x6, 0xffffffffffffff9c}) r11 = signalfd(0xffffffffffffffff, &(0x7f0000001840)={0xffffffff}, 0x8) r12 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000001880)='/dev/udmabuf\x00', 0x2) sendmsg$unix(r0, &(0x7f0000001980)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000012c0)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000100)="76bb", 0x2}, {&(0x7f0000000140)="9b3efd164eb426908b0e3e68049739eb60ca1e61749624ab07e515a6d4993ac6b0848e1db5410a6288e65e0302d936ba5d79615b044faa8b5c6fac325da86fdc4cdaf48a7f38c9d31aa06431161007ce53c1312fa0efa9450b8e664f5a9d645fcb728be9732563aa2c981e89555636bb72c9dacf81bf58a2c84aae125fd63fc3d34318ffbcf9ddd878534bca0478f3d261f12b3cc460882c674a110c3424d6a084020a182d97ef3120d0c29447ea6b508d2c0f74cbbaf4db122e935676ff096f2387939246e99f789b31db67ac9e15e91abdbca9e2af146b", 0xd8}], 0x3, &(0x7f00000018c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [r7, r8]}}, @rights={{0x20, 0x1, 0x1, [r9, r10, r11, r12]}}], 0x88}, 0xc000) 08:44:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6aa0008000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 393.250772][T30014] XFS (loop1): Mounting V4 Filesystem 08:44:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x8933, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 393.318666][T30014] XFS (loop1): empty log check failed [ 393.334728][T30036] XFS (loop0): Invalid superblock magic number [ 393.340668][T30014] XFS (loop1): log mount/recovery failed: error -5 [ 393.415010][T30014] XFS (loop1): log mount failed 08:44:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif0\x00', 0x0, 0x0) 08:44:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8400, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000180)={0x0, 0x1, [0x100000000, 0x8, 0x0, 0x1, 0x2, 0x4, 0x8, 0x2]}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000100)=0x6) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x1, 0x2, 0x1, r2}) 08:44:39 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff0f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6afffff000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x894c, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifX\x00', 0x0, 0x0) 08:44:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffe000/0x2000)=nil, 0x7, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) ioctl$RTC_WIE_ON(r1, 0x700f) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x5, 0x8, 0xffffffffe6ade45e, 0x0, 0x2, 0x200, 0xc, 0x6, 0x4, 0x0, 0x8, 0x0, 0x8, 0x1, 0x6, 0x0, 0xfffffffffffffffc, 0xffffffff, 0x5, 0x0, 0x0, 0x100000001, 0x7, 0x401, 0xfffffffffffffffc, 0x0, 0x4c62, 0x2, 0x7e6, 0x0, 0xd5, 0x2, 0x2, 0x1, 0x401, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x2}, 0x100, 0x1, 0x2, 0x444dd0af5c05dc30, 0x1, 0x200, 0x8}, r0, 0x6, 0xffffffffffffffff, 0x9) ioctl$RTC_PIE_OFF(r0, 0x7006) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x8, 0x10000}) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000200), &(0x7f0000000240)=0x4) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x41) unshare(0x40000000) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubif\\\x00', 0x0, 0x0) [ 394.084991][T30268] XFS (loop0): Invalid superblock magic number 08:44:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000001072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454d9, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 394.255929][T30297] XFS (loop1): Mounting V4 Filesystem [ 394.317755][T30297] XFS (loop1): empty log check failed [ 394.349734][T30297] XFS (loop1): log mount/recovery failed: error -5 08:44:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifc\x00', 0x0, 0x0) 08:44:39 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x218000, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 394.399227][T30297] XFS (loop1): log mount failed 08:44:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000002072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x40049409, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 08:44:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifd\x00', 0x0, 0x0) 08:44:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x102) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000030072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff0f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifi\x00', 0x0, 0x0) [ 394.985927][T30542] XFS (loop0): Invalid superblock magic number 08:44:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a0000003f072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x4020940d, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 395.120805][T30610] XFS (loop1): Mounting V4 Filesystem 08:44:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000540)=[{&(0x7f0000000140)="65445e983da577487273f85c2c04ab0d1a1824d8b49dcf3decfdfd9bcf08d492f94a38b79adbb045fdc6aad9239874f84cb00a9412c6a81e2d35dcc414c9190d555b698abafd0f79f142f2927f0f0c92b92496fc913835", 0x57, 0x6}, {&(0x7f00000001c0)="b5702c2acb1471e72b65cc83deaa2573ea9836c0e38303bfd1216cdef09ac0b497c31b24447f5f32e1cafa463a030d7f93e19b3d4123b399169a2efbeebb16a273989a89e911ad5264f2f47858ea4b21c1e12197ecec5c2204dd7fabe65f739384f005572ada332b272af21cd3c29ad4d494d4438199740645520df5272f12fd63053c0faf83ca6eb28b7df004576af86c82eb1087030321d78684a47166b13fe7eb61ba9f828ef1218e12155fab9fef5b35154f0e5866673e90dbeb48c67819546b48f19ca4c3c708f7da31a9af6c823b124b736aae304b7350816d339719", 0xdf, 0x7}, {&(0x7f00000002c0)="49fc6a67cea4468666befc01c27ebdc3270ee40339839adc9d28f70ea5890adf099df59394653d91dabb89a50b7f65db512afc7eeb42fd4a86ff37454c94173761471e843dd750f16a1ff79356661b6e4bc12467c3afedd1bc546eb4ffa3fc17670ed005ce3c5e662675c3683fd7594c390706ba39af6cac0421c33ad939491f906d1a1713259189c7a25932367c483a346993267b56b1b724a1086536e20d00f2528b5e91b4a077547f0c87cc581a2bcc7d86100864e85e7c409b39660f9c59163f9df191e4e81566bc1bff79238352be2b", 0xd2, 0x40}, {&(0x7f00000003c0)="25147833afee748deef72389ad21a4450d2f19020b8679fad6940d9b0068234b15259d2851d52d8a28a7ffe8030c3f1e483344fed0f877486a2ccec4e48e771562462116", 0x44, 0xffff}, {&(0x7f0000000440)="e049361127ca61bf7cd9dae29191000c99ae4e82f04437ffb6016ffa44961c20e2fbf883f6572829fe09654bb9199b64bb842c4deebff1d66b5b3b15a9b6416ce0c8e628d8959f8d509d9544b863d1ee46dbe6ef920bebcb33646cd23e175a9120efbaf9fabdbc4ddf628f86f504c0523d5f6675577afca86c15348e6db659bf36b882a4a27805c09908ecba598070b719c717a610b569c77e306f7b89604e347f3d22bdd053fbf87c1b1d1d9c78435ba9eaac2057a4fdb67de5551b366d3e34d9bc2b186895", 0xc6, 0xeb}], 0x30000e, &(0x7f00000005c0)='dax\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='dax\x00', 0x0, 0x0) [ 395.176944][T30610] XFS (loop1): empty log check failed [ 395.215202][T30610] XFS (loop1): log mount/recovery failed: error -5 [ 395.289444][T30610] XFS (loop1): log mount failed 08:44:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifl\x00', 0x0, 0x0) 08:44:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 08:44:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/mnt\x00') setns(r1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000380)=""/102, &(0x7f0000000200)=0x66) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x4000000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000140)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000002c0)={0x7, {{0xa, 0x4e21, 0x4, @mcast2, 0x6}}}, 0x88) r3 = socket$vsock_stream(0x28, 0x1, 0x0) signalfd4(r3, &(0x7f0000000100)={0x2}, 0x8, 0x80000) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x81, 0x0) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000080)=""/67) write$rfkill(r4, &(0x7f0000000140)={0x5, 0x5, 0x2, 0x1}, 0x8) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x800454cf, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000040072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff0f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifo\x00', 0x0, 0x0) [ 395.739920][T30791] XFS (loop0): Invalid superblock magic number 08:44:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x80086301, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:41 executing program 4: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@ethernet={0x0, @link_local}, &(0x7f00000001c0)=0x80, 0x800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) sendmsg$inet6(r0, &(0x7f0000000940)={&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000300)="e50467f2ef962656cc6d19fc2543e49806cff59d805c65c1af3aaa90daeae6361eacc995d552f9f04f7c3a75b099806e8c2b22e96fd49d03b4e42e79381acc10e3a6ebb83ba7d6a6790a7428cbeaff5614a2f1820529c1bbaa028e5bf7517236a6f79e3e652928ed315c44dd8adb2b5eb63cf328fa49a1e5faaab0ae9d82e17ccd4a53a3a5a726ae7fc768deface4517e72ce00b64aec61ec8a72c7212ccc263693535", 0xa3}, {&(0x7f00000003c0)="29bf86872d430f3d72b8b36852eef51d273503803e6a6378755d99474b48549f7a88caa75b1c5886c4da0036300de7fcebd8bf3bb06f335e1d2b4400899ab97cd26d2be3771d6851df5f41bb83d2892e3bbd3710d8b603", 0x57}, {&(0x7f0000000440)="a13ca26a0d066a0c164f691d27307857b58db99ab88a7945a968189fa6a761c436d24a2ea2f822ff26b5337e36121093d64a1f7649e51f1356eac02f9f319c533419ee3deecb54297c", 0x49}, {&(0x7f00000004c0)="2664cc2189600893e76eea969fd2eaa9dd49edc3c5392977", 0x18}], 0x4, &(0x7f0000000540)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x3b, 0x4, 0x0, 0x3ff, 0x0, [@mcast2, @mcast1]}}}, @rthdr={{0x38, 0x29, 0x39, {0x3a, 0x4, 0x0, 0x1, 0x0, [@empty, @dev={0xfe, 0x80, [], 0x19}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xffff}}, @dstopts={{0x80, 0x29, 0x37, {0x3f, 0xd, [], [@enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x1af2}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x1}, @jumbo={0xc2, 0x4, 0xffff}, @ra, @calipso={0x7, 0x40, {0x2, 0xe, 0x3f, 0x8, [0xc, 0xfffffffffffff51a, 0x2, 0xa7, 0xfffffffffffffff9, 0x80000000, 0x1]}}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0x4}, @pad1]}}}, @dstopts={{0x48, 0x29, 0x37, {0x3b, 0x5, [], [@ra={0x5, 0x2, 0xff}, @calipso={0x7, 0x20, {0x8, 0x6, 0x4, 0x0, [0x4, 0x2, 0x5]}}, @jumbo]}}}, @hopopts={{0x28, 0x29, 0x36, {0x88, 0x1, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}]}}}, @dstopts={{0x1c0, 0x29, 0x37, {0x33, 0x34, [], [@generic={0x8001, 0xd4, "2278bad1d9718ea26fb9de14d027e807b125f052f8290ec4b603b9ce10edc1e2f393bbd7aad4b97bec37a6a76c4e02c76578f2a3181a8b47e11d56db9f2fac22f6b1ab11d2323832ed86b4750582009d3234ea9e6a4bd9c0ba75b686282ab5de95cb7e135d50fe4902bea2d0484d653be3b2e8e5908e13819dc16545a35fa27482c0a1faf69976a77618dcdc8ff63e9c213399845683ecfb5d9c78beb5cecef2b58f4b7a6a49e1c2bc4becc87a5962ee45bd62ef0b65af212d4fa7c148f8071dfb6225bb17372cf174e9fdad71544944b532741c"}, @pad1, @ra, @jumbo={0xc2, 0x4, 0x2}, @calipso={0x7, 0x50, {0x6, 0x12, 0x0, 0x6, [0x4dc, 0x2, 0x8, 0xfffffffffffffffa, 0x80000000, 0x6, 0x8001, 0x8, 0x401]}}, @ra, @calipso={0x7, 0x50, {0x4, 0x12, 0xe627, 0x4, [0x6, 0x5, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x7fffffff, 0x80, 0x2]}}, @jumbo={0xc2, 0x4, 0x7}, @hao={0xc9, 0x10, @loopback}]}}}, @tclass={{0x14, 0x29, 0x43, 0x400}}, @rthdrdstopts={{0x78, 0x29, 0x37, {0x7f, 0xb, [], [@enc_lim={0x4, 0x1, 0xfffffffffffff800}, @pad1, @enc_lim={0x4, 0x1, 0x1ff}, @pad1, @calipso={0x7, 0x38, {0x10000, 0xc, 0x0, 0x5832, [0x0, 0x401, 0x9, 0x4, 0x9, 0x2]}}, @hao={0xc9, 0x10, @loopback}, @enc_lim={0x4, 0x1, 0x20}, @pad1]}}}], 0x3c8}, 0x810) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) getsockopt(r0, 0x7, 0x10000, &(0x7f0000000980)=""/145, &(0x7f0000000a40)=0x91) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='ext2\x00', 0x20, &(0x7f0000000100)='em1keyring/\x00') 08:44:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a008000a0072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifp\x00', 0x0, 0x0) [ 396.006789][T30877] XFS (loop1): Mounting V4 Filesystem [ 396.082130][T30877] XFS (loop1): empty log check failed [ 396.112528][T30877] XFS (loop1): log mount/recovery failed: error -5 08:44:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 396.199942][T30877] XFS (loop1): log mount failed 08:44:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80040, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0x5, 0x0, [{0xc000000d, 0x5, 0x5, 0x87, 0x2}, {0x0, 0xe4c5, 0x4, 0xa08b, 0x7264}, {0xf, 0x3ff, 0x381, 0x5595, 0x2}, {0xa, 0x8, 0x20, 0x3ff, 0x294}, {0x80000006, 0x7, 0x9, 0x9, 0x7}]}) 08:44:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifu\x00', 0x0, 0x0) 08:44:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6afffffffe072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0xc0045878, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 396.494212][T31043] XFS (loop0): Invalid superblock magic number 08:44:41 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff0f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifx\x00', 0x0, 0x0) 08:44:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000001340)='/dev/input/mouse#\x00', 0x7fffffff, 0x40) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000002580)={0x0, 0x4, 0x30}, &(0x7f00000025c0)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000002600)={r1, 0x8000}, &(0x7f0000002640)=0x8) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000002680)='/dev/input/mice\x00', 0x0, 0x80) sendmmsg$sock(r2, &(0x7f0000002540)=[{{&(0x7f0000000080)=@nfc={0x27, 0x1, 0x2, 0x2}, 0x80, &(0x7f0000002440)=[{&(0x7f0000000100)="31cd57c19ee1e7eac812b9770086a6cd8960307ecdf34221e32a1be5c2fc5a44c3b442a45d7801e53521ba79cf21d17956ef206fd5a8da0c8bdcd4454c6dc8550f07802ab2f97e6a67492ec966241b3ad5cef98f62efe1695bec4b54f61b159502c4d5a70996b91c73c22f5010d69e75cd71599d633e413720c1e75cc99924c76f91ed43a30800644af86e718c2a676e228e279b2657c862403e2b5ab34b3e37d2d107f9dbbc7f5a1bced70281aef4b8f0ad45787e1dce034a1fc272c04c8ca726cdc8e6f2fb9a4f9c174d1c4e9436c1593529f9b53f88571193c32f4026a3f1b94bea0a0b8f70d02a9bab6dd2e9492041c0d9351b9c", 0xf6}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="80bc510b725d45133a2d197da68e11b477a3faf3344f854632370a238c6472d06a817fb7aef318adfbb2b69398df79a65e3e9d7725fce4300cc9bc028f82619ab815a2a8544fa6a56ece3bc2f7828557c2f6b6bb4196fbeec4413bd0a812c55496b3f6d98a4904a35d2285fdcdbfa6fccdcafda7b2445a3fda5c6d9ad27cda", 0x7f}, {&(0x7f0000000200)="833f0e59516c15d5cceb1da3418ecd19b6f6f860c7a24d", 0x17}, {&(0x7f0000001340)}, {&(0x7f0000001380)="8d9b20c078173c414e0e2233a30a46658dbed1ef4acc076ec1a453be2d5c423e8f174c87a1dc32a6e02d5b3ab7740d2770c193194245988f9710a212ad1c898e686143f216b32880b54af2bae257034b3f9705527c8da40c9fe54e84ab8307c88d775ce629c951e75bb4b45f7eb5aaa3a52fe4f252cc6247a3fee1df5674cedd4e4e2a3fbf6ba74e3d0c1c205618493e0f6e654c1b99b38c36b7c47e12078dd97c2d02d79b8168e915f589e615fc5679359398de2afa8075ba5153aeb9dd0987c0c73185a77cf716be30356ac8b18b68ed8d74a95ba90fcbacc000ce006f74130be13df92b12fc754bd751d0f9677265d1c39ace856b7f8d1743a34fc73bdb7ab154ba2295937d17a6a7ef371bb6dd5a3ddaae1e9dac596d0b5522bd2e39bd068a4af2fafa43cda73a099133572a3cce8632fd1b05ad23ea946281009e6c0bfeb3cc52f5c34660ed887cd3fff516c8c39b812d3745308c77d7b47a218fe5a43090957ae8214ff9451b0aca91846672395b3ca8b17bd0cb0c98c52f520b5fa265827d7cf7364ead659b4a28d226baea0f27c30d39cb1d060a02d92ba89a2fcddf34017f291aafe60417218d63b5da934f1c586e9c9f93bf64b5d9f476bd5936d6f9f1e5a451874093b0e86ad15548eebefe64c125b9f6013e48f63a58f72d235cd36e0d2b574ec1bcc65e769466dfe91a71497fb51e27f62d821494545f7cc80d1ee6654322d41225fce67e654649c1333da80b75632b8f6bdbe8e3c0df2e7c32f1f0d088a8e7b0fcca2ddb1f8aede0b9d3544799ac3e9d0c8197772b05d30581c59eb53c295fff9000692e6c1e42ae99cccd8248ed230d023b2f5fb047c94c555ebb42a54f8172db86f9e71d2cd54b31ef6184c5b529bdbae96ec9f7edc7a50251a7c4498ead77ac3af300e6c7188712261697be3ccfdd44763d5cd5efb04952716bb624ecf49dbc55f4940e009e7a0c773a54fbb7bebb86e965a538e7bda321c6793e9766f17b1b186a39732b67fcdc05dee43871b4cfe49291c7c14524253d0c29a3809161443f4b65169071416b32cb38ba29c50bdbf7738bdd899cf3b9654774201b3686110c220bfba951b6f5fea1b7c5903ea34acc775094384250d082fa6f2db2f25b414e9c1152ab716b9769bf65992c31b7b25cbdcbfbdc8ffe00ec9b104e73aba8b4e9e4d36870927839d645606c3aa8a8ed16d3a3b9f5a8fabd60ee86ef17db6b3bb3aa2a667b672423892f0dd9df52a8ef7d30a8b61657e9dbd67ce15c7e0882d0f8c47aa2202229952b344ec2c9f7b2980b0ebbf39e53d2173bde780c5a059dbd66c1493c51ecb773e5d39ea3fc55786c7470d01624f4a4ce0ba1f222764bb003d791b4f72a9f5af7ff5d6f2bba6832fd13e047bd44d3cecc7e5982d51b861e196a2eba63ee7c2f334d011a626f9d986c4718770eb1bf3e21a0344a62d4d8ab0ff31901ef92642f43d5bdb511c0aef6ebc6e51782b802878ceef0865b17187f36fab4e222ea80310ecfe6bc94e7a9f39a8a44d66949d894c86ad8cd91f17af27379bb346062bc781972351ac56c9ba2d536fd7827c8ed5b8557bdaaa48f0fbacee9fc5208ff3f692dfa08fafb53436bd7179b8deb46a9e3561579009582c702a5baaa0cc8410338a3af2ac37a08bda58f52903ca5a7f427aa5bc9ea8beb28f64298753d2712e1026ce30861c1fa7e12a0f99620fa841b380cd2a01544f27dc753f26e58ee43fa3fd6bd6d26b7d89f096bec465aace5f1445c48a722b9b967dfde3806e02e845d5ae0f395f14012eb646390a88a90529ec682a5b9b83f4f633a54c13cad850e4f3a4b98db894619939331f958be3ad64f0850094efc4d77b12a1103311f8aae20ff6492cdd5becdcbe763c88b7ca3670ea66e1bf88a3c2648ed32e5ef5b66db8a44c793a393f656fc56eae70598bdfc5675de60e75636fcf3acaef842f922797ee259260e833be2325a86453a918a4b4f0feb286935aceeaf84b97328ee395cb1414d167b132cc6397a5f6386a6e9584004243ebf793626b0728e7325f8ad38202dfeefbb36243394160c153b2e33cf0c9e625b69f8799c65bac64b24fc9b61a93fc23cdf7af5969b6c44849b256e452cd515529fc9a4bf5a70023067e87bce0f876f91966aebb06bffebecf3fa7f81577495bf6ca14c45afa8cb24d9e5dc7d0a12ab56435cb494c8cfafc59153d179b31e45ed8bfeff92ca966bc2ae50e9d9304707ae797ab7b5a9af3df14bee635e7ced7dbd14a3f045ebe5529183ef6a209742f370365bf9dabeb4354b5dfe0d261aace5fcde0568ce020c4903e8f52b212b994a9c16f816e4f2de73940fc4b225000bd04aac6a9a536169543b275c7b0a7c5eded2e4fe1d55e14a0efe49923811f179ac26e30c04a7b9adf31a97e609a5d15977595985e5d1c886a98cec4cc09a93a684bb9a5fc534ed63ff0967442e72393a986b55654cbc083dd162d80f424545ff543c3c75fdbc984026ef916366727ed085401519d16265eac2926c0d906ff6bae2397b225614a6ad98612a1b0d6083c4589e212d9bca584fa16145d469f7b616e54c6c884e315b1cc21d1d8096cbb989dcb21342d69f9b3683b11d5a35da1d8d8faed032331f9587e744d27a72c1b85de013af55b5dba94e75fb1c144209e61ae7ac2875ab5d15137671f9e20c5d606545c085241ffb623405a2c223cb7b297ca39999636fc80e04e2a4b39a72d224649d9e1f6b37663bc532e0b8cbc389b1eb79d75c212465431430fe5ab06dc356b80c4fb9d96300fda395f9b355e35f1aafb95eb08f82d97e767eeb860ec53f7cedcc933ed642f78e74a8399af28f7e82256302a10253fc40c1b0fa50126bf4869316cf4f693b3636f8a3ac957bbba676a20f45b94c4082d5f45ee88b1945b09df4a99e6fa055eb2ab3c3d3905deb19ffe61fc1979aca01841e9ac55ee13613367853c5c7611ee99ea0a15d428bc6c3a1cfdb7b7cb80231109d66ea9a992944628d1e2618bce29f1f8074db3e52fbca354e1d4db4fb9a648475734fe1f8914c1b91702b09dc09732cc4d808c5cb5bc07ba652d0bf85b6e991cdf6b3f2acfcfcc2312a1c13501919774cf52e9316f8efbfa222b14110b0224b8e56b5d023eb5bcba45bb03356fbe31a79608dfc67d7876f3bb4ea5521a8650c46a77deede770ff8654bd056c67475b8f20a8eb03833c64a4c3779fdd929a460e3b0d09515fd0cdc60f74700be5835464fc0fa8c89235c6d33bafadb5410f4e42a133b939f208cffeefc69ca9f1e08087e804a344cb3d85621b044fd34d5434e2abc2b18bed0255498517527e357d23e568073d4a1277c128ab58f3ac41eb72ac58f33c0a8fe4493270ff1954d1a681bd230d2f72a091ffe45c69a486fd1894db7e29ff74cb27f8e8ded3e7a50c6f3b426d6b9244af0486301dedcb3580e6590efe1f5885b9615495759651395245220157f140e2886198a51e0fb4e476faea15f90c8a805d8b14ca0b5d207f6ec5a71c18972ca122cd275b2518425dfb310f691eb5a6f08c438edb4fc3a0f751d0a9912e96aa1ba59a18b9bffe433c68e83799a96bd28230b582be8eb57e5343f646992c3699c599faef85638546925249c4a764d1aabfa4c7a157a8274d33f540d987924c69176fe3a3bb94cacf84d799d7e876a0759fa8b2fc623b4ef1b402c63b7f764561ea83c524ab79af2787be09894ef50d1854095ae10295904f976fb55afce7225ae7c4f74e6a36cc93ed5d0ef5c79babbec3ddba614a8e3353a9e5afc3d118b72fce265b265ad4f84d945514b114fec349a5a5e27c0b6c6a53ed141ac06314c23814e1e38e425d3d51d16c734f0860019ad376de9a7a978f9b731e78e2f153acf1aa3d00d0069ed69cda15b70cfe5106a6b5c5f4863e5de5b602f52e0d4ce99b025cbc840df3f84bbbfc65fafd890c6dc169db61bd3b6b713344cdf06cf6fc92ad42012cbfa4e9a2c6795578af3bf48938c88b56b5354066caa64083e15ab0349828382bcb5ca65d8957ca561543ff712a40985f6a08789a2736dc2318f89151b3f8cc1d57cfe9db2c844e48d4768c7fa6c1bb519b342ff9ab1d0b126e754e9dd5ba99d03e1ca233558096bdf80c20a05c4ce084f62e30c37695dddd96eddc4ef079f1632c8c4ede16a10e1a826f93ca331cd07b94ab723776831188fa192c3c0d5c2d671b1764500695c896c7196640dcc7f92b25ff4166823387ee2072059f744b7566c2e6d43c16888bb344511b5311bcd235e9beda868b994950f96a59e34b55ba4c24941c191b36e95e3cfb6c4220bbce0129838a59851e4187fc457a5d4049db7416db3b1065aa4fa806560377130add15f6baf20a12253f0c84c7d3212a6b85a2a1ea5d82c4b5e75fecf0005735246bb7070b104744db2873f743ea998ccfdab11929f6cbd6801f03bcc26473e3e4ae5edbe675582e607a94d200ad164530ccaad6fec9668bfd56dfb9d356f95d8a723b27d643ef775ad170358a4889c7cc3094408af900484e2fa5c60d8e41dea93cfdc567db308219674999f8a505a4c6d1f5271e4aa9bf349c9ad7ef16449016b70e69a0b7a3f7664b2383ae3bc12891bf47955cbbd553ef428db5cc2dc4535205d6a1511a37e5fc284f845d184b114817f890ceb7281ae0bdfa65f83da398f148265780fe7ff63f51b9c141cda45702af4c4376b0ec3ae18190805c471530b72865eeae6ac683841322a95a02f521500bad2c95919ee437ec4bfad5ce79d6e0501bd10fc00385b9e3e4acd69b02a3e1b879ab0f56cc43aac615fd03a1ac03583197ec749b2a1094708c0aa95501c5e5115df3c5894bd183e929c0c689e5dec08771d01765841cdc81382a6a07ef1185b64d97ce33cd4731a0f6c434fb72da502b9a9cc9251037146138ae576f324aaac694bdbf32f7c4d0524bb016784bd760187d294707f5b6ca46fb10168cfbff29e6e52b0be41d348e14433fb44e981e1926b575d610227b21ccd97b920b2e3e44b53252f03f30d8e416aabf28274b57f1c3aca402f63dbb2c69b80392244b0fb658534dbbe10515cec618d327929a6c503dc54b84ed432fc2cfb20295ebcb50a62deb4cb2da714f1f376783b4ad24a20385e56bf71c2d382d88e5b654b919df912c74affd18db4a7f1820e00918bbce61f2d1fd3558dbda9532b26b7750f1e5dedc4863179500d4504c86e20e20680c930b1818e5df9b7110806de193f7b4516463395c3d9a2a49f42c7e383ac13d138d3cbd48a81588987fa5984aaede7842b50134b49384fba046282e0b02cb4326f8f9a27b330761684f75244c6d2cbd8c940aef6be2bd83f30daa00de671fda7671650ecb6efb5b68160e59cd884e16644ead77306ed668709ac782d6f9e3e9d76b328a9a2e30c14a402da093642dcc1239e6eabaeebcb56247c7319729d6b451b6c4c1f4056fd87b60f259c71ee8bb3c2b97d312076a31226250857e305a3f1d667cdf4c66fac07d676ebbc49c0fce7cca0c16a4232f370de627fedde408521b17c773f5ae7d1f0a9c28d962adbd7fce6dbe3658ae2193bd6c25b30ea28c81b91e34baf6cdee1884f782f5e0f50351b8084027adaa74c3c35d6c7b43b01ddea4a17044391c412fe43de8d944d33d752ecbf6e7bc9f7469335e95a2abfc4ad1d0744cedb95fcda59020d232d7500491384856ed77f47ee8e5416935fac6430b7e1405eb06d166ca507445c47ad65621603cbf0cdcff2c329d191cc28ec8fb18668fd94a30658f0d8cd1d365ea463c2e84adfff039dd2605a", 0x1000}, {&(0x7f0000002380)="db71bbff53c2aa70021b2e4638fb942d7582425d5ee48abefddd812a4569fa4220e15a6f6c452e11da93239d552ef3bcc17895e9883c298dfdf7b97c3a484121de3ebe757b03066a0299a60ea63779e3b80f22f0808637b153fd6a382edd0a4fbf0f53829dffc2309cb35f141668d1e2858fa7ded37d709817dd14f2d37cc6f06ba9e19b5554dedac2ec9d7acf14c3312c00cd9fd6fd116103151f78b9efc5ec8e26d8f0bd711adf42d157b5efe6610f119fcee30a0bccca0054e60a1f", 0xbd}], 0x7, &(0x7f00000024c0)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0x435c98e5}}], 0x60}}], 0x1, 0x20000000) 08:44:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00f0ffff072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:44:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0xc0045878, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) [ 397.003744][T31170] XFS (loop1): Mounting V4 Filesystem 08:44:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x02', 0x0, 0x0) [ 397.066296][T31170] XFS (loop1): empty log check failed [ 397.109097][T31170] XFS (loop1): log mount/recovery failed: error -5 08:44:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x40) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000080)={0xb, @vbi={0x5, 0x100000001, 0x1, 0x787e4f5b, [0x5, 0x40], [0x4, 0x9], 0x13a}}) prctl$PR_CAPBSET_DROP(0x18, 0xc) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@md5={0x1, "7028c68a3299b43b4b645e86891cc949"}, 0x11, 0x1) 08:44:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6afeffffff072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 397.199108][T31170] XFS (loop1): log mount failed 08:44:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x03', 0x0, 0x0) [ 397.364001][T31293] XFS (loop0): Invalid superblock magic number 08:44:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0xc0189436, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) io_uring_setup(0x5bf, &(0x7f00000002c0)={0x0, 0x0, 0x7, 0x1, 0xeb}) socket$unix(0x1, 0x3, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0xf711c5f995f3fc0b) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @initdev}, &(0x7f0000000380)=0x10, 0x80000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x1, 0x10}, 0xc) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x2, 0x80000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f00000000c0)={'nat\x00', 0x0, 0x4, 0x16, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)=""/22}, &(0x7f0000000140)=0x78) write$evdev(r2, &(0x7f0000000180)=[{{0x0, 0x2710}, 0x5, 0xffffffff80000000}], 0x18) 08:44:42 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00020000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x04', 0x0, 0x0) 08:44:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:44:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x101, 0x80) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x4) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xac, 0x1, &(0x7f0000000100)="a12ff732a15b73bbd6ddc8485c1803c4650b6b46c1f9a022cc6e6018e3c3038645d3144cbf325d06758804c84f262315ed2ccc3d6c69eb9bd499c9f233c93801fa5c94c721a1193b68e4866e594cd10aeb2089f9d16c309aece171089d7f1f50c9f6078a10fe4e520f06bf056d865e55fec4d7048a4e0488853d399a1bc12784a1124390f5a41ecefde8eba6acc5e5d60ee07da28def69e6b050bee3f0fef7223898f0926ae29225f18ade14", &(0x7f00000001c0)=""/1, 0x5}, 0x28) 08:44:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0xc020660b, &(0x7f00000000c0)={'vet\x00', 0x43732e5398416f17}) 08:44:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00300000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x05', 0x0, 0x0) [ 398.052076][T31534] XFS (loop1): Mounting V4 Filesystem [ 398.070541][T31538] XFS (loop0): Invalid superblock magic number [ 398.147444][T31534] XFS (loop1): empty log check failed [ 398.186340][T31534] XFS (loop1): log mount/recovery failed: error -5 08:44:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bfs\x00', 0x1002002, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0xfffffffffffffffe, 0x200100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0x5dd8}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000180)={r1}) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.origin\x00', &(0x7f00000002c0)=""/4096, 0x1000) 08:44:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00f00000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 398.334097][T31534] XFS (loop1): log mount failed 08:44:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x06', 0x0, 0x0) 08:44:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\\et\x00', 0x43732e5398416f17}) 08:44:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:44:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) 08:44:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00003000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\a', 0x0, 0x0) 08:44:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\b', 0x0, 0x0) 08:44:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'v%t\x00', 0x43732e5398416f17}) [ 398.995094][T31791] XFS (loop0): Invalid superblock magic number 08:44:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00003f00072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x2ea7, 0x111e43) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000140)={0x2, "0dfc1dcde6be252820941fb0688ced1cf2f4d4f2fe3d5d2b661f77b9dd522d70", 0x5, 0x401, 0x7fffffff, 0x5, 0xc, 0x2, 0x401, 0x8000}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000080)={0x3, "7835988f022a8efd7d8d79815da717f795eca0a584577bf0559680d27b20ee6d", 0x7, 0x820, 0x5, 0x0, 0x0, 0x3, 0x0, 0xaa}) 08:44:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x10', 0x0, 0x0) 08:44:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'v\\t\x00', 0x43732e5398416f17}) 08:44:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00004000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:44:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@generic, &(0x7f0000000040)=0x80, 0x800) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000012c0)=""/4096, &(0x7f0000000180)=0x1000) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/4096) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x7f, 0x7a8, 0x80000000, 0x80}}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifsH', 0x0, 0x0) 08:44:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:45 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a0000f000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifsL', 0x0, 0x0) 08:44:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ve%\x00', 0x43732e5398416f17}) [ 399.947855][T32152] XFS (loop0): Invalid superblock magic number 08:44:45 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x5000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff2000/0xb000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000040)="e00ecbdee15dc010278992fbb1dea6d1098010ffe5e06f496e4eca8d36ae2c3d93d5c3696964eb1042af5a0353b2ab8016c6bc71865f5dde09df35d80b0c6e591e3fa3e78f6e21057c350c7c714e6e607f55b376e5954e685e1b1385d061690fbed6da14c4721b7a6edaa485dc7025bad9c997aa0de725f457317e4598054c5c382507e31ea856fd81004236fed640276922551237aec4b3014ca2e5be90aa089fbef1b925be727f2ca594c88a15490305d27ba96c44ba9424fc191bb210aac027b9a0d8f2417202bcba53a9", 0x7a, r0}, 0x68) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000200)={0x9, {0x68, 0x9, 0x80000000, 0xdcc8}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifsh', 0x0, 0x0) 08:44:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ve\\\x00', 0x43732e5398416f17}) 08:44:45 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:44:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000402feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:45 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifsl', 0x0, 0x0) 08:44:45 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x800) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x7, 0x7, 0x0, 0x200, 0x80000000, 0x7, 0x3, 0xffffffffffff7fff, 0x8, 0x46c, 0x6, 0x4, 0x5}, {0xe68, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7fffffff, 0x2dc, 0x1000, 0x7, 0x5a}, {0xffffffffffffffba, 0x10001, 0x9, 0x2, 0x4f, 0x4, 0x0, 0x100000001, 0x3, 0x3, 0x8, 0x0, 0x40}], 0xf7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) [ 400.696587][T32394] XFS (loop0): Invalid superblock magic number 08:44:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000200072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifst', 0x0, 0x0) 08:44:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x02\x00', 0x43732e5398416f17}) 08:44:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000740)=0x1, 0x4) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000640)=[{&(0x7f0000000100)=""/16, 0x10}, {&(0x7f0000000140)=""/44, 0x2c}, {&(0x7f0000000180)=""/33, 0x21}, {&(0x7f00000002c0)=""/167, 0xa7}, {&(0x7f00000001c0)=""/119, 0x77}, {&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f0000000480)=""/104, 0x68}, {&(0x7f0000000500)=""/213, 0xd5}, {&(0x7f0000000600)=""/58, 0x3a}], 0x9}, 0x0) 08:44:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00003000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:44:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifsz', 0x0, 0x0) 08:44:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x03\x00', 0x43732e5398416f17}) 08:44:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x800, 0x140) 08:44:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a0000f000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 401.516826][T32630] XFS (loop0): Invalid superblock magic number 08:44:46 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xf0', 0x0, 0x0) 08:44:47 executing program 4: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000)={0x74, 0x3, 0x3, 0x5, 0xffff, 0x0, 0x1, 0x1}, &(0x7f0000000040)={0x5, 0x401, 0x7, 0x11, 0x4c4e, 0x9, 0x3, 0xffff}, &(0x7f0000000080)={0x5, 0x0, 0xffffffff, 0x7, 0xcd7c, 0x4, 0x100000000, 0xada}, &(0x7f00000000c0)={0x0, 0x2710}) 08:44:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000030072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 08:44:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x04\x00', 0x43732e5398416f17}) [ 402.046816][ T307] XFS (loop1): Invalid superblock magic number 08:44:47 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x100) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0x4, 0x100000001}}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a0000003f072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 402.197719][ T361] UBIFS error (pid: 361): cannot open "./file0", error -22 08:44:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 402.378518][ T430] XFS (loop0): Invalid superblock magic number 08:44:47 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000040072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='smaps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0xfffffffffffffdb5, 0x0, 0x0, &(0x7f0000000240)=ANY=[], 0x38}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x05\x00', 0x43732e5398416f17}) 08:44:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:48 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000f0072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 402.761953][ T558] UBIFS error (pid: 558): cannot open "./file0", error -22 08:44:48 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 402.890736][ T559] XFS (loop1): Invalid superblock magic number 08:44:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x400) r1 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000080)='ubifs\x00', 0x0, r1) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs ', 0x0, 0x0) 08:44:48 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000002072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 403.135615][ T680] UBIFS error (pid: 680): cannot open "./file0", error -22 08:44:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='D_\x85\x80O-#22\xddU\xe8H\xbb\x84\x18\xb4Y\xb6\xe5\xed\xd2\xf8a\x12^\x9c}\xc0j\x1f\x0e\x9a\xe2\xadr\x04eh7', 0x1, 0x0) [ 403.351727][ T683] XFS (loop0): Invalid superblock magic number 08:44:48 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:44:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x06\x00', 0x43732e5398416f17}) 08:44:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:48 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000030072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x100) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 403.707756][ T876] XFS (loop1): Invalid superblock magic number [ 403.733921][ T920] UBIFS error (pid: 920): cannot open "./file0", error -22 08:44:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x10', 0x0, 0x0) 08:44:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 08:44:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000402feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x2, r0}) bind$rds(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\a\x00', 0x43732e5398416f17}) 08:44:49 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 404.258585][ T1107] UBIFS error (pid: 1107): cannot open "./file0", error -22 [ 404.264421][ T1034] XFS (loop0): Invalid superblock magic number 08:44:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x140) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000704eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 404.467780][ T1167] XFS (loop1): Invalid superblock magic number [ 404.492314][ T1177] UBIFS error (pid: 1177): cannot open "./file0", error -22 08:44:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180), 0x40040, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r1, &(0x7f0000000700), 0x1000) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setreuid(r2, r3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000040)={'lo\x00', @ifru_mtu=0x4}}) 08:44:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000706eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 08:44:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\b\x00', 0x43732e5398416f17}) [ 404.734747][ T1289] UBIFS error (pid: 1289): cannot open "./file0", error -22 08:44:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:50 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000711eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:50 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 405.086896][ T1411] UBIFS error (pid: 1411): cannot open "./file0", error -22 [ 405.163053][ T1406] XFS (loop0): device supports 512 byte sectors (not 0) 08:44:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/tcp6\x00') renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1) [ 405.315206][ T1530] UBIFS error (pid: 1530): cannot open "./file0", error -22 08:44:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vetH\x00', 0x43732e5398416f17}) 08:44:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000721eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 405.409401][ T1497] XFS (loop1): Invalid superblock magic number 08:44:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 405.607507][ T1581] UBIFS error (pid: 1581): cannot open "./file0", error -22 08:44:51 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x88000, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000729eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) [ 405.913309][ T1685] UBIFS error (pid: 1685): cannot open "./file0", error -22 08:44:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xc0', 0x0, 0x0) [ 405.980644][ T1666] XFS (loop0): device supports 512 byte sectors (not 0) 08:44:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x145000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x200, 0x0) syz_mount_image$ceph(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0xa, &(0x7f00000017c0)=[{&(0x7f00000001c0)="f960d4b3d561fc2fce5b1b2865c0200f9b77399731488eba1a94df480f8457c9a3b7677167562b2373e3c418ec0e", 0x2e, 0x3}, {&(0x7f00000002c0)="12a727127b6d32430da7f9349a0aeefa2e1b1606e5544eca6108d236d5872ce246c6ff9129c5283483f7160448ef9874dfbef3309643957f5ba0fa88371deff85964666e8dcf9ecca43f5e6dfe9d01fb0b343e3791e5fa5ce3310d50bc72b97d3614c4400248a49c1cbac2da1aec36a6011705ed65e36da8c7c56d1bea37ce6eecc953ca36a8a413f61595154f2e94a1cac018248b05f285b9991173fd76e9b9a31bc717299a4d28151813741aa2c0ce28cdee1694cdb9191319a584b1ad7ec3666418f5f818c05ca12e2bcf64d33edec9ae4a22839b", 0xd6}, {&(0x7f00000003c0)="11ab5549ccc6fb2031d899f8894cab9c2b32bf584cbb29d5343da737d9ef24703c745ce7eedeb49c9fa78808fbe45f69e5240fd2a803d5fb449ff1465ab446ea6326d3a5503a75c91fc6c32aa8d2fe38649a8c4e26295a014358558ec884f861bb0f0e160f6be438d91634f4dcd01900d02466a283520d3adf20d7f1765c6bd5327d462f420ab30158aae51337a3394e62652e635451d04ffed9087950a00ac7c67fa40e913058b9ba07179d73d271928d9fa35546aadde3d5826e84e7803cb56bfd3aaf600d9e0aa7ce37f8085877a12f", 0xd1, 0x9ae2}, {&(0x7f0000000200)="d9c6a28a1c763df739ef43fd5cd63a27a9838e25fc67", 0x16, 0x6117d079}, {&(0x7f00000004c0), 0x0, 0x2}, {&(0x7f0000000500)="52bc90aae946cd58ebb59e07227d0ac32c3e61b56f9e17173501f50b8a0d809b59321e69d3f676d73275b2f95724a9dce3a0b4141d61c5fe2b6138384ad801ab0772f7f8a0de5f077554151a9e3988cfd51f9590f18586e439444938cf95e21b0841be394953ddad586c3c60d222653a39834fa951c524136f717f9f9ba6370dca95cd7b6c232d7eeaabf776c42cab614649f0084f230beee6", 0x99, 0x3}, {&(0x7f00000005c0)="63e67a9578325cff9055e9fa603a5f6302c1c79c4f3a63b897fb098e8285f908bbb538ac81a126aee2557fd9b767086fed979f840503b268065815e95bacb6b8143af68a2750e9bdd8b3e18ec1c37754fd2654266b059eff95c46dc6f36b53df8da6e820829aed372d16e89b25ae06acb17648959d6eff66695fb214f0db21268b4467fb0297b4302baa1c98cc58354d8a6fc6eb22ed098f7cb6275f771a8a0ef4d998ccd57902f329fac60b7628a1aff52af6920859048a34f82526c6f3825595d040c7688b7d0f30e5e0746a8eed2ed73216f276f18ab69c7cdd78d52e095418ee1fef50dacd20f7ceda64c3aa79e011a091111a", 0xf5, 0x1}, {&(0x7f00000006c0)="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", 0x1000, 0x1}, {&(0x7f00000016c0)="8fe8df215531926793223510904aa1581c61325ba270d9e386024bda71df1b32985589b58a1d813d67f8cf2feaeda61a1767902d", 0x34, 0x80000001}, {&(0x7f0000001700)="ef19e3de1640d1ce9dce008cc05d9bc7e970847419d2f4a51ba9b661378fd1e6872318047ced76e0007da353e79b0e5115fee7df08cbe48f0fedf4aa9018c23f5dd6c83debb608cd95c964795aaed7856708cfa92f4c7f691aea6226f5629c184fdc4ca55d1de555fd7f80ab214b71ecb2eaad272e71fa191cd4ad3c661493f5641b8b8b32944039cbc15b4c", 0x8c, 0x9}], 0xb35d29dab598b887, &(0x7f00000018c0)='cpusetselinuxuser$bdev&\x00') fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000080)='#!\x00', &(0x7f00000000c0)='./file0\x00', r1) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vetL\x00', 0x43732e5398416f17}) [ 406.135685][ T1794] XFS (loop1): Invalid superblock magic number 08:44:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072beb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xfffffffffffffffd, 0x0) 08:44:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 08:44:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 406.450910][ T1919] UBIFS error (pid: 1919): cannot open "./file0", error -22 08:44:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072ceb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:44:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x100) r1 = getpid() r2 = fcntl$getown(r0, 0x9) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x401) kcmp(r1, r2, 0x4, r0, r3) 08:44:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'veth\x00', 0x43732e5398416f17}) [ 406.734678][ T1964] XFS (loop0): device supports 512 byte sectors (not 0) [ 406.783743][ T2039] UBIFS error (pid: 2039): cannot open "./file0", error -22 08:44:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xff', 0x0, 0x0) 08:44:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000732eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 406.973594][ T2044] XFS (loop1): Invalid superblock magic number 08:44:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 08:44:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000733eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vetl\x00', 0x43732e5398416f17}) 08:44:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0xad79267580ffad72) 08:44:52 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 407.486110][ T2170] XFS (loop0): device supports 512 byte sectors (not 0) [ 407.544483][ T2285] UBIFS error (pid: 2285): cannot open "./file0", error -22 08:44:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000073ceb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x3) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 407.857637][ T2327] XFS (loop1): Invalid superblock magic number 08:44:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb2714cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vett\x00', 0x43732e5398416f17}) [ 407.877937][ T2409] UBIFS error (pid: 2409): cannot open "./file0", error -22 [ 408.128619][ T2427] UBIFS error (pid: 2427): cannot open "./file0", error -22 08:44:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='msdos\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) recvfrom$unix(r1, &(0x7f00000000c0)=""/111, 0x6f, 0x20, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) [ 408.195877][ T2430] XFS (loop0): device supports 512 byte sectors (not 0) 08:44:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc0dc8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:53 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 408.396467][ T2543] UBIFS error (pid: 2543): cannot open "./file0", error -22 08:44:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff02ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:53 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xd8140, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x100) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vetz\x00', 0x43732e5398416f17}) 08:44:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) [ 408.617616][ T2662] UBIFS error (pid: 2662): cannot open "./file0", error -22 08:44:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 408.829916][ T2661] XFS (loop1): Invalid superblock magic number 08:44:54 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5020000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x5, 0x40) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000080)=""/90) [ 408.997879][ T2683] XFS (loop0): device supports 512 byte sectors (not 0) [ 409.011436][ T2772] UBIFS error (pid: 2772): cannot open "./file0", error -22 08:44:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x03\x00', 0x43732e5398416f17}) 08:44:54 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:44:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='f2fs\x00', 0x2, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) r1 = geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x800, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, 'f2fs\x00'}}]}}) 08:44:54 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5300000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 409.349190][ T2905] UBIFS error (pid: 2905): cannot open "./file0", error -22 08:44:54 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 409.585372][ T2918] XFS (loop1): Invalid superblock magic number [ 409.607943][ T2998] UBIFS error (pid: 2998): cannot open "./file0", error -22 08:44:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:55 executing program 4: mount(&(0x7f0000000140)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ext3\x00', 0x0, &(0x7f0000000200)='cache=loose') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xf000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x5}}, {@access_any='access=any'}, {@privport='privport'}, {@cache_mmap='cache=mmap'}, {@fscache='fscache'}, {@debug={'debug', 0x3d, 0x9}}, {@cache_loose='cache=loose'}, {@access_user='access=user'}, {@debug={'debug', 0x3d, 0x40}}], [{@obj_user={'obj_user'}}, {@audit='audit'}, {@subj_user={'subj_user'}}, {@fowner_lt={'fowner<', r2}}, {@hash='hash'}]}}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe8\x03\x00', 0x43732e5398416f17}) 08:44:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5f00000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 409.853802][ T3045] UBIFS error (pid: 3045): cannot open "./file0", error -22 [ 409.874546][ T3038] XFS (loop0): SB sanity check failed [ 409.890507][ T3038] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:44:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 409.939681][ T3038] XFS (loop0): Unmount and run xfs_repair [ 409.962942][ T3038] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 410.035255][ T3038] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:44:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 410.094493][ T3038] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 410.146223][ T3038] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 410.146271][ T3138] UBIFS error (pid: 3138): cannot open "./file0", error -22 08:44:55 executing program 4: open$dir(&(0x7f00000000c0)='./file0\x00', 0x800, 0x100) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x8, 0x321000) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x38) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x801, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000280)='net/sco\x005E\xa2\xa2}\x8b\xba\xaf\b\xba\t \xbcL\xa2\xce\x92$\xc8\xdc\xa2N\xa6\b\xe2\xf7\xf3\x85f\x86\xe6\x9a\xee\xaf\xabK\x16\xe9\xb4\x86w\xafc\b\v\xc2cHh\xa8\xb11\xca\xcc\xd8\xc1\'\xbb\b\xa7#\xf9\xa1\x8c\x14s\x96S\x9f\xbasK\xdb\xaf\xadwnad\xb5\xa6\xd7!\xe5K\xd1Bu\x002\xf4K\xe0%\x9d\x88A\xe6\xa1\x18\xaf\xc4\x1b\xd0\xba\x11?\xa5\x00\x00\x00\x00') mkdirat(r2, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x0, 0x0) [ 410.192400][ T3038] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:44:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 410.235396][ T3038] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 08:44:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 410.291391][ T3038] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 410.399168][ T3196] XFS (loop1): Invalid superblock magic number [ 410.430135][ T3038] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 08:44:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x05\x00', 0x43732e5398416f17}) 08:44:55 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x109000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x3, r1, 0x1c, 0x0, @in={0x2, 0x4e21, @remote}}}, 0xa0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 410.477989][ T3038] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 410.503657][ T3038] XFS (loop0): SB validate failed with error -117. [ 410.510701][ T3339] UBIFS error (pid: 3339): cannot open "./file0", error -22 08:44:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:44:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003f00010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='cifsY\x02X\x14\xb0\xfb\b\x94\xd1`\x1e\xa3#\x13\xa4\xa5\xbea\x80\x10\xea\xa2Q\xaf\xc9}:\xb8\x95Tk5\x11\xad\"9\xe16^3\xa7&\x7f8\x19\xa0\x10\x15P\xd4\xab(E\xaf\xad\xfa\xe56.\xcb\x00\x16&\xbaF\xe7\xc0I\x19\xdb\x10\x81\xf4P\xa2\x00\r}l\xa7l\xb2K/)\x161\xcb\v\xd9>4\x06\x14z]\x031\x1a\xe1+\a7\x1eb*1\x1cc\x00\x00\x00\x00\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000140)=[0x1, 0x3], 0x2) 08:44:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x06\x00', 0x43732e5398416f17}) [ 410.827791][ T3456] UBIFS error (pid: 3456): cannot open "./file0", error -22 08:44:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 411.093692][ T8921] XFS (loop0): SB sanity check failed [ 411.103401][ T8921] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:44:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x4eed}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x3, 0x101, 0x208, 0x5, 0x8, 0x10000000000, 0x3, 0x100000000, r1}, &(0x7f0000000180)=0x20) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 411.144967][ T3580] UBIFS error (pid: 3580): cannot open "./file0", error -22 [ 411.166057][ T8921] XFS (loop0): Unmount and run xfs_repair [ 411.191646][ T8921] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:44:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 411.218510][ T8921] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 411.233854][ T8921] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 411.257684][ T8921] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 411.284726][ T3581] XFS (loop1): Invalid superblock magic number [ 411.317025][ T8921] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 411.362490][ T8921] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 411.385383][ T8921] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 08:44:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0xb070b1c147db267c, 0x8) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000001c0)={0x0, 0x8, &(0x7f00000000c0)="4faf7549a254c4bb35af286671f96c64320f71121386c9ecfeaf56a350102a340bb54824ec7e8dea06a7b1885ec4ceff6256c70e84d6a9920617b339d5ea4cc483c130bd55e440ea6dbd26129af6c7122aedbb58bdb752c3c902ed6631d4b8cbf7df958795bf26a9bb2ccb8b3b7eae6ee2529eb514bb7dc21537b0226397c21a0163327d268cf2d0a5c062d838b4252457b5a79f9f6afe947deb68c3d7f9e514c56413ede882e241892256119fd99f5c96450bf2fdfcd3010fb70907fd55e8647319e55f00ebf42492bdaee9c496b5d8b82d3e9c", {0x800, 0x5, 0x494e4f4b, 0x8, 0x0, 0x80000000, 0x1, 0x6b77d845}}) bind$isdn_base(r0, &(0x7f0000000200)={0x22, 0x9, 0x5, 0x180000000000, 0xfe}, 0x1) ioctl$RTC_PIE_OFF(r0, 0x7006) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x810, r0, 0x8000000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000400)=""/102) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000002c0)=""/74, &(0x7f0000000340)=0x4a) munlockall() accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) [ 411.414358][ T3668] UBIFS error (pid: 3668): cannot open "./file0", error -22 [ 411.414752][ T8921] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 08:44:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 411.468908][ T8921] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 411.489459][ T3462] XFS (loop0): SB validate failed with error -117. [ 411.605700][ T3743] UBIFS error (pid: 3743): cannot open "./file0", error -22 08:44:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:44:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\a\x00', 0x43732e5398416f17}) 08:44:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x18, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [0x3], {0x2, 0x6, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev}}}}}}}, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500f000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:57 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) [ 411.972411][ T3835] UBIFS error (pid: 3835): cannot open "./file0", error -22 08:44:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x1, 0x0) [ 412.180946][ T3846] XFS (loop1): Invalid superblock magic number [ 412.225070][ T3935] XFS (loop0): SB sanity check failed 08:44:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000020000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet&\x0f\x00', 0x43732e5398416f17}) [ 412.270411][ T3935] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 412.354595][ T3935] XFS (loop0): Unmount and run xfs_repair [ 412.387444][ T3954] UBIFS error (pid: 3954): cannot open "./file0", error -22 [ 412.416886][ T3935] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:44:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:57 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0xfffffffffffffc00) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x4000, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$rxrpc(r1, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, 0x24) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000340)=0x2, 0x4) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="100026bd7000fcdbdf250700000020000600080001000000200008002d001f0000000400020008000100e48b000028000500240002000800020069f6a85f0800040000000000080001000b000000080004000200000004000400"], 0x60}, 0x1, 0x0, 0x0, 0x20048040}, 0x5) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) lseek(r1, 0x0, 0x5) [ 412.526489][ T3935] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 412.544695][ T3935] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 412.555095][ T3935] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 412.574074][ T3935] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 412.661302][ T3935] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 412.714291][ T3935] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 412.744787][ T3935] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 412.757927][ T3935] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 412.773432][ T3935] XFS (loop0): SB validate failed with error -117. 08:44:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 08:44:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000030000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:58 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 08:44:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x1f\x00', 0x43732e5398416f17}) 08:44:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xff', 0x0, 0x0) 08:44:58 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x7f, 0x2000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x807ff, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000003c0)) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x4, 0xd, 0x4, 0x20000, {0x0, 0x2710}, {0x1, 0xe, 0x0, 0x1, 0x61, 0x36ed, "b785b780"}, 0xfe, 0x3, @planes=&(0x7f00000000c0)={0x8, 0x8, @mem_offset=0x9, 0x1ff}, 0x4}) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000180)={0x0, r1}) 08:44:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000040000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 413.343318][ T4185] XFS (loop1): Invalid superblock magic number 08:44:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x0, 0x5, 0x80, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e23, 0x6, @rand_addr="068f663e2f3f8992457c8563eefb3fe7", 0x7}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, [], 0x10}}, @in6={0xa, 0x4e21, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x5}], 0x94) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="c08d02fa0bd6879adb112c32fc3fd16235dea8242173aab421a8c73a59f64122df64aafd8866443b97da5edf098bbeafee90bd93c15b71ca5109cdca851c0e6bb67995a51d36cb9647a1c4a52787bd501833ab51c56436c196abd760752b8181d3a56dd0cdcf8d6ddc6f1c82", 0x6c, 0xfff}], 0xc000a, &(0x7f00000002c0)={[{@usrjquota='usrjquota'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './file0'}}, {@data_journal='data=journal'}], [{@uid_gt={'uid>', r1}}, {@measure='measure'}]}) [ 413.393977][ T4276] XFS (loop0): SB sanity check failed [ 413.430980][ T4305] UBIFS error (pid: 4305): cannot open "./file0", error -22 [ 413.449277][ T4276] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:44:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00 \x00', 0x43732e5398416f17}) 08:44:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xff', 0x0, 0x0) [ 413.505113][ T4276] XFS (loop0): Unmount and run xfs_repair [ 413.524887][ T4276] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 413.533760][ T4276] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 413.572324][ T4276] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:44:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000050000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 413.690741][ T4276] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 413.718268][ T4276] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 413.744754][ T4276] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 413.839378][ T4276] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 413.894638][ T4276] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 413.913804][ T4276] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 413.928684][ T4276] XFS (loop0): SB validate failed with error -117. 08:44:59 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 08:44:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x8c, r1, 0x30e, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24000000}, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) chown(&(0x7f0000000200)='./file0\x00', r2, r3) 08:44:59 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 08:44:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xff', 0x0, 0x0) 08:44:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x0f&\x00', 0x43732e5398416f17}) 08:44:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5ffffff1f0000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:44:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:44:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f0000000080)='reiserfs\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="7251404f918bd17ee97c03a87c07cba9", 0x10) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f00000000c0)=0x3f) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000140)=0x143f, 0x5, 0x6) 08:44:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000400000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 414.508037][ T4456] XFS (loop1): Invalid superblock magic number 08:44:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00@\x00', 0x43732e5398416f17}) [ 414.619855][ T4551] XFS (loop0): SB sanity check failed [ 414.634239][ T4551] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 414.688161][ T4668] UBIFS error (pid: 4668): cannot open "./file0", error -22 [ 414.689192][ T4551] XFS (loop0): Unmount and run xfs_repair 08:45:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x1d7c40, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80402, 0x100) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x1, 0x4, 0x5, 0x7}, &(0x7f00000001c0)=0xffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x6}}, 0x10) prctl$PR_MCE_KILL(0x21, 0x0, 0x3) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={0x0, @rand_addr, @initdev}, &(0x7f00000004c0)=0xc) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000440)={0x0, 0x2, 0x0, [], &(0x7f0000000400)=0x7}) [ 414.739178][ T4551] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 414.818317][ T4551] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 414.831397][ T4551] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 414.884984][ T4551] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 414.944867][ T4551] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 414.997758][ T4551] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 415.008574][ T4731] UBIFS error (pid: 4731): cannot open "./file0", error -22 [ 415.026951][ T4551] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 415.043472][ T4551] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 415.055876][ T4551] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 415.066884][ T4551] XFS (loop0): SB validate failed with error -117. 08:45:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 08:45:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:00 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 08:45:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xf9', 0x0, 0x0) 08:45:00 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$sock_int(r0, 0x1, 0x3a, &(0x7f0000000080)=0xf01, 0x4) prctl$PR_GET_FP_MODE(0x2e) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00H\x00', 0x43732e5398416f17}) 08:45:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x8c', 0x0, 0x0) 08:45:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x10000, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000180)={0x2, 0x1, 0x2, 0x8001, 0x7f}) accept4$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x80800) 08:45:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 415.653555][ T4871] XFS (loop0): SB sanity check failed [ 415.664282][ T4799] XFS (loop1): device supports 512 byte sectors (not 0) [ 415.664513][ T4871] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 415.743806][ T4871] XFS (loop0): Unmount and run xfs_repair [ 415.779060][ T4871] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:45:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00L\x00', 0x43732e5398416f17}) [ 415.799122][ T4871] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:45:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xf6', 0x0, 0x0) [ 415.883976][ T4871] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 415.914326][ T4871] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 415.939245][ T4871] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:01 executing program 4: timer_create(0x1, &(0x7f0000000180)={0x0, 0x17, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000200)={{0x77359400}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000140)="955f4856bead735c25025d9a9cacd8009f450ae50b5e183079d52eece975e7a26a51a4db341036e37813") lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0xa8}, 0x28, 0x1) [ 416.022393][ T4871] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 416.068018][ T4871] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 416.077530][ T4871] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 416.087227][ T4871] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 416.109515][ T4871] XFS (loop0): SB validate failed with error -117. 08:45:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:01 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 08:45:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00h\x00', 0x43732e5398416f17}) 08:45:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:01 executing program 4: syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x800, 0x301100) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x8000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000180)=0x100000000) accept$nfc_llcp(r0, &(0x7f0000000080), &(0x7f0000000000)=0x60) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x80000000, 0x0) 08:45:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\xff', 0x0, 0x0) [ 416.518333][ T5148] UBIFS error (pid: 5148): cannot open "./file0", error -22 08:45:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', r1}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r2, 0x89e4, &(0x7f0000000040)="a32cbe79de5cbc67e767895b0a053c1033e3a194ad30b6548249da261b8215caa4279126847e21ca183fa738") [ 416.699146][ T5152] XFS (loop1): device supports 512 byte sectors (not 0) 08:45:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00l\x00', 0x43732e5398416f17}) 08:45:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 416.979477][ T12] XFS (loop0): SB sanity check failed [ 416.999601][ T12] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:02 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='\xf7\x96\xc1\xcf\xe3\xdbBS\xcav-\x14f\xd4S\x8d\x98\x00\x00\x87\xc82o\xe1\xa0\x90\x1b\x90N5\x9b\xd8\xb2\xfaE\xb1*F)p\xb7\x17{\xd4\x1a\xe3\xae\x17\xb6\xf0\x934\xe2\xc4gDgtu\xe1\xfb~\xa8\x1c;T\xdeCB\xc1\x8f .\x14\x14\xb2P\x98\xb9\x05\x00\x02!\xd1\xc3L\xa7\x10wM\xe4dK_\x15c9\x94H\"\xe7T*', 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000280)="c64b6e286cfee0cd2bb143e0ada0c01aa27b5a1a0bd6d03f4c988ff33fc15f2a5b02719e4e47c27182901348e7d1020700881c4f6ba2f0dc8833ff0c79fdf00a51dc36aafcf94061142fa5961fee2cf2cc716e2880a861d1f2", 0x59, r1}, 0x68) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000680)=0xe8) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x4, &(0x7f00000006c0)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, r2}}], [{@fowner_eq={'fowner', 0x3d, r3}}]}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x8001, 0x4864aa20, {"c020fe5fd3988446d86824d9597bba1f"}, 0x2, 0xfffffffffffff000}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000001c0)={0x11, 0xfffffd7c, 0xfa00, {&(0x7f0000000080), r4}}, 0xfffffffffffffde8) [ 417.057145][ T12] XFS (loop0): Unmount and run xfs_repair [ 417.076370][ T12] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 417.092184][ T5386] UBIFS error (pid: 5386): cannot open "./file0", error -22 [ 417.092830][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 417.109360][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 417.109387][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 417.109400][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 417.109411][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 417.109431][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 417.157531][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 417.176441][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 417.185918][ T5265] XFS (loop0): SB validate failed with error -117. 08:45:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:02 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:02 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 08:45:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000002c0)={0xfffffffffffff95f, 0x6, 0x4, 0x40000, {}, {0x1, 0x0, 0x80000000, 0x6, 0x5, 0x7ff, "a8d73c32"}, 0x8001, 0x0, @offset=0x100, 0x4}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x12000, 0x0) write$P9_RMKDIR(r0, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0x10, 0x1, 0x3}}, 0x14) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='minix\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000080)=0x1) pread64(r1, &(0x7f00000000c0)=""/143, 0x8f, 0x0) 08:45:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00t\x00', 0x43732e5398416f17}) [ 417.628022][ T5526] UBIFS error (pid: 5526): cannot open "./file0", error -22 08:45:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='\x01\x00\v\x00s\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x10000, 0x0) 08:45:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 417.775541][ T5507] XFS (loop1): device supports 512 byte sectors (not 0) 08:45:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00z\x00', 0x43732e5398416f17}) [ 417.883090][ T5586] XFS (loop0): SB sanity check failed [ 417.896964][ T5586] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 417.980779][ T5631] UBIFS error (pid: 5631): cannot open "./file0", error -22 [ 418.003398][ T5586] XFS (loop0): Unmount and run xfs_repair 08:45:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 418.049462][ T5586] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 418.057291][ T5586] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 418.080877][ T5586] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 418.133457][ T5586] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 418.148670][ T5586] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 418.190206][ T5586] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 418.207916][ T5586] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 418.294324][ T5586] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 418.339296][ T5586] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 418.356661][ T5746] UBIFS error (pid: 5746): cannot open "./file0", error -22 [ 418.382199][ T5586] XFS (loop0): SB validate failed with error -117. 08:45:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='f2Cfs\x00', 0x20008080000, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x2, 0x30}, &(0x7f00000003c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000400)={0x7, 0x8, 0x3, 0x8, r1}, &(0x7f0000000440)=0x10) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='(\x00', &(0x7f00000000c0)='f2Cfs\x00'], &(0x7f0000000240)=[&(0x7f0000000140)='GPLppp0lo\x00', &(0x7f0000000200)='f2Cfs\x00']) 08:45:04 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 08:45:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x87\x80\x00', 0x43732e5398416f17}) 08:45:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 418.805947][ T5758] UBIFS error (pid: 5758): cannot open "./file0", error -22 08:45:04 executing program 4: socket$rds(0x15, 0x5, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 419.008056][ T5779] XFS (loop1): device supports 512 byte sectors (not 0) [ 419.057037][ T5875] UBIFS error (pid: 5875): cannot open "./file0", error -22 08:45:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 419.145014][ T5873] XFS (loop0): SB sanity check failed [ 419.151854][ T5873] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 419.198030][ T5873] XFS (loop0): Unmount and run xfs_repair 08:45:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) mkdir(&(0x7f000000b3c0)='./file0\x00', 0xd) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair(0x2, 0x6, 0x4d, &(0x7f0000005fc0)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000000080)="6ef1a268c5c691240bfd1c96dbfd11ee7740b7572b9304bc24d400cde427742d30e5422bf8d1e553492f6eb0f82986dbcd051573b0a745a2414a192b5130de", 0x3f}, {&(0x7f00000002c0)="e830796c875eb4c3e7bb7f995db513bc883169882c30ce6f45647886c75304a33413f8e23cc65aff6ef5d1718f4f7facaa148f0ee9c9ab1b92513a9045eab8d73ceb12d25fb1c309efec886323c9eb4c3238dee4d8c59cb1a3c2fe2cd86803f3eb0994f585bb8887a388924c0c1676951b54ee0facfc6b0ac7afbfb0371ea7bc5748e923db6da0f38a01d6bae64d93b8acc74fad3c99c9a447b58c247191a2ce3187fcd9d2b1297d64298f27a3e8eb242a51cc9d2c53310d985d69e3d3d45c229fbc795ef40bce8b4084957dd987db86bf61427e4ea778cd323a9235484bf450a9bf50cad9ff063201126b2333810be797aaf49fd0c078297cef57d6c0bb74311d67b8fcb752c6258d778fda940aad6b8da7f3ceddd76c94b37e88069d288a701748bdf83e3decf89e636c1a11a29580b30ffc3170f7cf6db78d89099a5c7b83d16d34dca780be1742fa821b44685f9525a52144745eb4f5e233202935270ceb42102b24c86485887cde6f6fdec8c39f508fd313ae4e9afe69d21bb9ce93868727fb4ab22b29598b6f1dce249713ce914885a1d8172149ff723b0f8898081347772dbab52f15694dec00e8880cc80c3452b7433988860fe2cfba132a9bbccd8897c9155295bee366995b19542c01d2ecfd8757ad364fd4109c953eb21da0968bb33e8e82f1bf9ccfb1391bcee219bef17cb57f3556945c79c28d4f68b69837de56aefccf1727b0fe562d4c1e363c5559f54b1d37dd0f81d35ffaaa361a03fc50d3526d84f2e9d5892b8f7b9af4146942c742dcc2b46312ecc5828ae1474287d8acabe0e285b9263e1eafb70fe5686190f781147a7ee8cbd842942a603927de48c59e12a9a229229cb161cc7ede49e4951cac98575596d4cbedf46536c3e26cf7b348710fd9094e08f33b44aa094d40309cb70a347cd745ebdcaaae140e50eb0a7d5a57008ada2b38ebfb9e3351835546805611927acbc60d0feb2cc0f00fbbf83de6adc8f4100db26b620620401151e8dc85d8c24e00c9ab16580c5072d4be2a34e7ab331bd7435f12724f24ffb059435203ecca1cba63e3843d5d8c5f84e8ef78788f51e78011c0a252b5f250a1bc6130234c29234934485cbf1120f3925ef4156ea91142ac9ac157f47884bef589bbb116d1bc2c6bb707c3bdc4c4e5e8651202170db5c2ba9513ff31a5be63532a1f82a04bb1a2fde3a32e758677cb5a997ff7af7ecccc450e584fd26fbf6be7926befb86df0810fbed51a396769a669b9fbdddaa4d795418f722f5a0e76d858631f06af7ae207a87705957d44df0784d1119ed093b1b43bef88e55ec5f27d6ee610b09e9ecc5f3fd00d6c0b24d45b5e6e9756ab7adaf7005442eb7f5a0a88b4af0c8711fa5c178f0f7685861bd4b4c79879e4273804eca88b39c9e57ca464406606afd6c0c25564d6b69a21fbe72d13f8d0700db91bdf860850e36cc569556bb83aa7bbb217d8f763e17bb67c50ae1e2a542b4676e1e707b0cea475133e21c57f5c7b6d1ce06017bc365796a7962555813dfa4099c27bc83a6840de8ba6dea3d9e2c8814d644a1e3458a04f995c569a3280cd7f7063d852fc3ad17a94bcb320b38eca14e65cdb4e186d52fa0989c2683766be5c3d5fd95698e96496d45c7e10ab803eba9d593ba72e55f4ba3b56b9603110cae791ff9b2ee796b54c8c2a476915c893b34a129a8013311c10bffe1a5bb6abafc24841f681db826e3989031d3ff38b43ef03d070cbcc423750b51dedf4ab6355f920d365659702b1ca312522f4f73431ee5bb4dc319368e377f98bf54f4be36107d64a9d809dc2b139544d6a83597926829f33e6a693183b102cb6791064f6215584a728e5a9ce4382d7bc62000606d90408c5e2b0b3c627b0c68612dfefb44326a138b7a376cea9a6bba7477e98d341e60ab57ddeabbea69e6bea2bc693515b57d335e45bded6aa5641eafd13fc62a419a893ac0d9b58f9e29a874f1214c9fc7425290875106f62cb7ec77f4c24e97d901869cb905e5ca7295ab944e422ad984b6f5f14d1ba2e869a799faae37fb3b0159934fd7fd1150c3cc45885e0e80c77127f1757a8d863048bcf2ae6acc7a5641cb2ca51b457f6bbd6a3306cd63ad165e8c79912ff3efc9c46c78e765113b212cfdc287cdd6b2c80f6a939a9f3069605c5a010efcbb979c6a86a76f9db5ffb81ffd3368a6d8d0acdd60eb0abd91ab025a15c97343be97f98951ab56a291cec081cb19b36375c2f555e578c84fb79eb2e1108f46d6ee97caba4552ac678e59e8b04e9f69d8e5a11f0a48ee9ba404e09e1fa01ea3c862f8f2a6c07c056e4013a0d0d6fab2c473c5a8c26a7f008276727a91afb909b5ddc3fce0d20bb4dcf6f903619548640c4ac67060961a31c00891e291652943105f99f3b32d0385d1ec6eb2ee6afb97d48295b7d20f7cf39dc644d3221787186f9b9a38fa0f97878396fb3215e6e5a6570162b5d0d1591931d138502a17c8c20e99ebc8c903321401757788b03410240415533b6d89d81efa761de99a4ce7756647321790c21f1a2bfbb9a4950d73a9002fdd68985a784d2b0870fbdca41cab766f0fc4357d92bef9f645ea02872cd63017e20d04db308aa168c72e629f01701cd3a0ef9878379817b30abda89c6e42601d6ccf4a52f4a79115b46a5614e86773a500c4b45f2f96c14b9758b812ee890cf9e6a9f572281d1badb238f91b59891d61580dc64e309f10f2e412cb1dfdd404e2303f09493339b3c84b2b7d7510c2ab793560ec1b1a821b4d4cb0534ccd073ddc49f3da61dfbfef0702143011b93155c1ed3b2bf0bf5e3363f0866dbb4257f2152b3862928498a8d026c28478776d076df78f6dbd595deb70691151b0b471c7f4646e5e749780563c5f0c4fb6255d4fa6fdbce307747646f5a12f333d8cbf728797f5e3e65a6d18bcc33acc9682fe36865016259b08d319955eb2b7094927f0f5cacd3e68846022a71ca4668c184cda1fd1a6798dc2959bec89f41c2516df46cfaba05a3c02d6c871235707a99b5b0e07a9d755e1b2926d90ddd467997d9f405451ee259f59ed287c5de17e81862247a4f3700ba0d8daaeea7e33f412decd0ed066adf33f067046afa5c5234a64c4c2acacfa745be5aab81db0fb6a1ceee9b84c884fb9caa6be870beb5c5071e0856a26cef0c456774dfff2a7d2fb3ad47db52b6abfa59b0141d4b5ee822616b4f825b6120c0a7e57519fa1e38857ccec83b7ddde582577ff19668d530a868af3d4d161e8178b51fa696cc4ef3d674b5e09dfd56edfcc500b124c8bc8d336ca45ec5b1cb082057b6dedf413eed911b24ce9ff994c30f78eb43ab451e578da7fcb57c1ecbe93c0608c85e5aa2fdcd876b02c522d4b4f30419ccd0bb9c6243103aa7d1688e74c7269463ec28225b8647b529b8adb604221de2edd9ade8cba788444f3fe4018876bc84e43d37e5650789b57b63a29a1f85b3c2b7a437608d0c2f592eba0bfc00f163ac71e33416d5e61819cc4d22f7bf74d690386c07c8817105274529ec9013c9ed95167fa2e64936f3f0afd8f50c0b462ec6382ebb22ba0fe54c3e1ef0d29310dd62a1244c8c8a9a013fac9ea65e51b454da80b29dacd60fd789f87fcfd3eba73300a1a66b33db647439221a11b65b2896b11e9607ee92f5f108cb3dbcd108ad07bae3e863d12269e89124801764523248a0416be1ad66351892f4447e718a9fe40dc9fbb2d6347398ef1934c364b1d0857e0e2b234a67f830dd3ffd35fda2e46b4c7d3b2bcd8f961bdb31cf4ae7ecb32ccd66eeb85bcf25ee7698921dae195ed3aa14862f98143b3c1bc35f9c90d56ffe03870fae012bcdc90e821d60bd02b761dc1c756cd7a24f5d9d4d9bb5c601a3b29019f9f56a864f7fcec9acc8bf6d1e9000b61179e40ffb09de1c4a6e0a736cbf8b689e4480fe324f561429272c0dc653bc7127d59e62fc3cd11c2c245bb2c60045670c1ea9dfbf404e8cd66975069673ae86028ead6377dec5247d4753ce87519fe9126421f9e2837d90c58700c2a08f0a911ec1851d45a239e31df468cb615d1bd82e464cf484d438147fe13825fa17beb93b8a1a33e303e1ce712164f4e21ed5a431d1e27e9d22d53c305244dd67f02b15da7a1620dbae107b3c5323f967e41d7046f7b901fc3a7aa0e29b520744690bada72da6ecea49bc169126e1bd9149175659a58725bb38f198e12a85ccdb77c761e1b1abceb338cbd4a5f115b006d02eadd811cf1ab289056eb52a298d2737157d411b51f0ce05a9867663cde28a007eda63fa448c973f581e014cf78130f1a4c89f83aa8888e8cbb9b7c447b1c0880b60a98763aa91556b8b2828244d157372289c22f48ff7d80c9caece28eadd26ab1b8dca0f1e699f23ef100e5b1dbb1d681f8bf8ae58ecd2335685d29346f167c8394c407c940391e157d3f08778a9c4fe3f24bad1e6f6c480d6bade32ec79d4987057e8602a0a6dfc609d450c0b28e2c07b0f65ac47f3d645f04de6ae6c73180fc21cc80c0c11e4794d370e5cd00122c805d4181a22ea8e5ffbb846ee8550e5ab768f5593dc057d3e009403b080a29e1313082fdafabeab52265b45dc56525a85f3842b19a4fe9078c909a393f91c524e69d8a6a165368dbad5b89d16ddbaf59e03369deb76de459d3ba4257c2bb635150509fc0e80c9b202b8ba9222667f3378b377a0af7851966be81a74c7ff139ca580cd8029b2082ea30741ee2ac7ffa68d6c1e06a8430fc6a2b9646e3b467addddbd9472d90b2748bc6e5d1b81c7dd478506640cf7e0a743e75c7eb2df599aadd8f00feaa378d1d4ae0e7b2fa24e79ef2c0a5ecd999027445057402fe4c960285b9aff044cd808d0917aa8f113945dc7cbd2e0305e8eca71660a774da84ffc7eaa2d84a1e652af4ac79742a0d9be2d1dfaf64c200c9ff623a2dfdcf06ce89c0e9fe701a98977e0e74bb021f9f8939f774245e4ebae781c93e782799f2243477e6f5f6d9b4bf5520f0bb41c2c9cfbde39c3956191a79da0b12e9d710ba55a47c5a24630dd8ad6c09a5b2f6285e30d75ce8b6eab9022cab8ba4ae3e23f5ffedd46945a65236f62b11d6a10d92f25cdcf414a7d929d9bdb3b0d9d58316b7c52ff1523cf8870f77648b84c191c3151c647f8b741b8d8fe714a8066bdbb559cb2b98110258a0e947fc872fd9e21c6649fe2a50e8278729535cd3d60d6379f7cb7c1ec18c82c525d916934e1ff256819c1f00c43e8650f23b5772bbfa288030fcfb1c5e657cb8e884b61fdc8ecdc0a9499b6c5b7f76e0036e9e490a29b88c91983822b5c1fb11d07026477f95cbd0fdde6bd357ff6d062d394e4dd47e9f52e0520765ff352ab9032a14e62833568270c965c56418c287aa75dd9cc5d43c378fd9e1ea63f97ae7cb4922b00ace7e45f90f53ff23c319bc4b98f53fe9bef32130685ac88e1949e858be0750be1a629bf96b158633919857ec76ef329e674b36d2941201eab22233303d269f6e255f6474837479e185a6c73e6d5bbe6f4f13f985d08fb5cfdc13ec659c8234c382050ddbb1ce5323487c63986e615335a1713e8c5783c8726dc02a2249d637044a1c461677c5e4e5836cfd5966c580bed456e61af949fcdc9d85b3e1a4bfe339a1dbe0acbec1637cc4a63c26f2f8e485a469fbb642e478fb5c6e1117908bd929f1dca2b179272af36bbec4bae2f47b5ce3a8ca2d83d0e18d07efb1c3adc647657efda09c262e74131d382091ffd13b56cfb82117608140683c52d0ecd57a8a1649fe39d362abb199c8bb8ba1baa", 0x1000}, {&(0x7f00000000c0)="89d850482d03deda3edb253c9a769faebce92aa6a5fdefcec57f4cfda8745d8d5a454c02dd30c7c3a7b4d1741a7dfede03a15069087be4b40db4cbd1a483989354619ba28ffdeae44938f649a7701615567723a5d2d687cba852609111826e301b5fafdb99627a8c99ab359b37048044344738b694ba8605b87a9e7e60ab01c9750c41b36791811de0a6c64cdf25a4250977c028f68c560f82b15ab064cb64f155725abc846d275c5659f84137a28be67c0c045b46d456112d38774647461e69d6bd47e3d97f8a77630e49dc176328b5f4a2a564c9495201358d1ed2b10724", 0xdf}, {&(0x7f00000012c0)="ead87428ce99fc620a5581fbdba2490516ab2ccecbfdf1c664f7b1e74a3cec68fc20b95618384ea9c0bd8021af2a9d99b536056283d5aaa0afb92077be88a3ebee4b1c04f1417956b1ed4c0af892f68151e25f337154eb225c2f4de7da41a17c9eee87aeba7b6289685dfda4307f77b3f291e282391c800ef1869da50c0647697da8515ab71b692edd41061c63145adaf66133fc9c93121873a38e60ebf4f7a2717ad7b366a828ec7d70e7568e57c0bd5478fa05aadc8a538d9c08c51a9664a1d4c823538a184d480a22d3b1048441322e77a2b6a2ae238fdfde566bfda3f964d17c97cdfb3214cf5d15aab88abf2e3724c341", 0xf3}, {&(0x7f00000013c0)="4739a5b63423506e2456513a0397132a5d74a869d0e5a242d7eabed6efacf418fcbed13ae3c9562141046a45f3bb8392df03406db54387680717808f93688dd3249958ef0435f0e9b74072f3451e3302d0c7da8b1e97ceae63acad50325e36c4c38275af000276f31507f75af665b73781f9efb3d7ee4b79253eb3c8a9a14b46341da51312cb84ba57c8fc1f95c15c78f7a54a8cfd3d54c9f0721022a641287d9ab52c85b664aabe5aa6ddd391fbbf4348e38c8d218d3fee95470b79f6bb68735d", 0xc1}, {&(0x7f00000001c0)="f480eae2b85c60e375e4e9f414809d340d1fdb700d8747a79fab1e336aaed91ca5", 0x21}, {&(0x7f00000014c0)="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", 0x1000}, {&(0x7f00000024c0)="64f5d56b4bb3e1ac245f72542eb1c8deca6b33834d40e563569a68ff8fc7c14dcd9a7572adb977beca33804514fc8659c93c3ff4e6101767552582f17600963c673ea1ed5473d50208680902", 0x4c}], 0x8, &(0x7f00000025c0)=[{0xb8, 0x109, 0x0, "1ca3e0e699aae75c3997a49e010378e8ba2267ff22c0eb90cf88373447fbbf8fddd8419c18edcd65c9dc1194dc023d087e36b919f891015c915b8b7d9c2654187e7c201a6b6ee0e9c10635b9d392481063c602e587196317b9411bdca47439b18a94a30627c36b0d2114471306a81db0c68a7904bac3e6bedc619cb288002c81a1b5d01ccd2777e7e49962b6203688319b43e13207d6c2b8c588df089b5e519f4ddb"}, {0x98, 0x101, 0x684, "a3e2875eea4cf5c002c1bdbf243d6762065ff68ed4712e8b3f06bb437e165ccc42df73c5f473590025226eb1770704e49768e47f91e06ed1344c3f85ef1feb8720954b58408b13ac57df42e8edc4e0f7f73ce5cf3700c9252eaaf2bc2102cbc709144c7cce8f22a4a922742edaeaf409b73771b47b125803cc2dfac2df4047fc7b4dbeb004ec3ff2"}], 0x150}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002740)="e11881294674f1d88000ab33bc4b2b4e92d4691a1d3103ddc4060f7732523dd9702fcd8235148898e66da83a97b141afda797ecebd214c6572536a105aa1827328783f5a0912bf71074ee8555adced00", 0x50}, {&(0x7f00000027c0)="4cd5305d12e2b44c6fedddbf13eed3b86d781bdc4567dacbcc9f1d933ff101365f020a2be3bd50d18861348317e04dd67ce91fb815131dcd774d25a6649fc4f2c8e074d7dfcef3967bb21f09aba0beee6fe19a567ca6d48c2e9a07fa936551969c572c66f47ad124b5f027e1e98b63d84d9d04638d73fef9bcd518533977c2a31b9c582366b19103f81526406f43b12a60afb57c5e56e4f176bceaa087a36bc8816bf1fa900edf5d966939b7c6515f63d17340a27aedd52e937ede26e6c3b71b8a924f76e75b17bf45bff7871ad6", 0xce}, {&(0x7f00000028c0)="bdfe189c87ac62490fd6f13edde81788a59d13ab58d2fe77c3cee589aa99095ca7febd64533fb934ed6b365e756680bd90c22bb80209ab79b1e65a892778a14dc9f64ac981c39d0d76239692a637e41c337a00645fcbf2840dbaf938b32bb2c0f3a51152a7295ef29ca84789c0fdfd9c07622372d8f9dcaad9ead72f65cc45937db091a50646", 0x86}, {&(0x7f0000000200)="15d529e229f08ab2c2cd5d52698d51b7790f96f1", 0x14}, {&(0x7f0000002980)="78252c14fb10572794000bff722e4560ac8850584d75bfb67cfa55bb9b7e219aaa70c951f2f197bf3c943c9c3c86909d26a329d55f7c07602833f1a56c3bd3ac01fcd26861432b9d1b5959a34d72f4af29b3cbb52745b5707b6ca207ddbbf40159c9503f0c8ac2b202e1fa53e1dfb0c3038c8d3b4131cfd778e9c0e5489420883d20b06caf25fff93aa30f2c8526e7c70dabebfd567f7ff76d7fbb1777f68fc732829bacb8ae3c67c4dc34ec5d9092be7eccd30fcf913acf60b3fc07c173ba1a30bb12e7d1070689364f69d4b131fa70e23f0b83a61239b8941f1b7002ff5706aec6d4", 0xe3}, {&(0x7f0000002a80)="4f3786c6ebfbb733181bc3dbc2745953b6c857d329c4fd9a9668a58f0834381d352d6f4ab901972815f2eea309ea65cc99b85b1718eb4d48ab2e7f649e64761bed0ddb235ef57f8e46010f82509744886d4ade4640dd5b2af571387c1fcfaaebaba26723c757f602d72bd867f04d3a86f81bc5fc43e40626bf92b38c413eb320018b89cfa51ac981d790597c3002d11083d7d842513d040b4060787feae41f33a88bc11870645010168b7a37b0be4c0cbb6932f269608ce8f85a07af26d9d38413", 0xc1}, {&(0x7f0000002b80)="657fcf93812216a869f6c477f3fc5f4cf60a88d41750bc96695bbc32da49a552f2daefd9fb5fb744676bb9d07fc9581cd8146dba8ea16ea0a35fc360462624ca7d91d683bde8c9da7ed6346d3a001de05012735880e1110ea44338f6612cebed66cffbe2b6cae3a6f367ff2aa243e768836c2c4ae8099800f6b014c3bf3561a3a1d8e94be5b291a3d6775e53c5c6f8b352c3c1", 0x93}, {&(0x7f0000002c40)="b1a12756dd1f02815fb46f22064bb4a83405da7238383c621c77b9b90de7e65051057cec5e91ad8c1bd0fcb5134c866c1a03e58fb472d67e85df8b4198ea1c810123ce22f369cfbf6c15de8dc494a96604a1554a602793d1bfb3bedc9f24bc17884da0120177aad6c38c95b7d28098210ed3654d1e88f58f6a789a433ac394dbeb67e87681862af6de599fd7ea39971adc49d1aa8d8b09523266373b6e1062397f67b01690b9c9b96d67485d3b54829b4d5a9df9de4357b4a6dfe2f587664aef6a6487", 0xc3}], 0x8, &(0x7f0000002dc0)=[{0xc0, 0x101, 0x2e, "e51e74d472c6c2e0e8f42843b6fce786f68dc56f06b4d992513c349e26baca48a3839cc24d7c53557d14a3d84052947966cf9838ad8b4c8de3af09f6dae0e59f731580aa94e75a5588796dbc9db45a373c3a13906e65acadd57951e123d9d5f35aefe1b9f74a09a433bc49febe7b06d0b8675caaa180b2a1e3d40bcfdeeb2b0451ba13ab60b3ae05acf339b8b906e1e2237000350cc9fbf4870ab5df774f957f799ada99fa9370d306719cde9212"}, {0x20, 0x113, 0x80000001, "9263c51154ee571c69ba86045e03382f"}, {0x98, 0x10b, 0xc4, "4b859bdd703026fc234b23fcabd7c7d54633af894b7333707ef2412c470b5fb18809886098d45b4baf796d334bd35d5681ba56d3961740dba7aebc6c14d3c2e4023f15b32bed614795eed00df56a66aaef2cc8296bec0347fc0974a01ed30eea2695291b6ef83d030573aea82dddf6236277bcf1f444b74e770bc0d347bc58754f736797002ba439"}, {0x20, 0x111, 0x6, "03a5782dacad450ca594e3"}, {0x78, 0x0, 0x1, "7866f3a696d0f1a29dcc2ba89832aee2136275cefa856d623ae6bd96a938726ee573ae40189cc5c7a09afb65f86b4687af40cfbb84e964fe2d4f94dec68c449d995deb512a4ee1935611263e5d2356c3ca1917bd5a388d909db0ef118f197206d77e29806aac089c"}, {0xf8, 0x0, 0x7, "89418e9a55de55bd5db1c152f97382aba4e14e9a751de474c8814adcd2d96f4b8ceaab479018d5321d68c2cd66b001efd24c0e31f46578941bdc03f1015fa83d743ec8a1ff71c8168408e6e18a53bd1a8000c8965170849380f62fc274d9728bfbfb8b9a2978776ad613b88bc03dcda0bb3ce59b2b4c5aed8d8ef01340f20c439f5265e0cc569475165886ce5121cc8229c1e8e4e6e777ea73793f68733bbdf55c15fd9d71b0d74211e2ac522c1a08389cdbe38b9739c89a7720d026179e1e1cbaec00213b769abbfb89dd1ef0b6502ce3fd19b942656bcfe6b7f189680cf73f7d32f621093a0d"}], 0x308}}, {{0x0, 0x0, &(0x7f0000004680)=[{&(0x7f0000003100)="d604c9770c5176143e6e73c121ef469be26dfb5e89de5fe1fc9d1b9dc5eadb23073df5edfade6c2c682a030c6fca2f720df1e1bb374514abc90b3c90313bd1e030dca77a238e8f7129276ef94b5aa0037e7c6c929dd45ab69042e9c441d8263d255b54143c130fd4aefb148ab87964d4cb800526dfb2519fdad11c67db41de3ce10dbd5e58520c557f4c0d8117ee5f3a7daae2747d21e8da400086daefd68602100001ae05fc550c95800061199f83d7c6c1ea5537ac0f790f02e6e2b1", 0xbd}, {&(0x7f00000031c0)="21e4ebd353385f152da2cb86c830245dedee50f5f45133ffffd1c8c51b5a0f59c8eb334cfc929ceb68e86fa5068d82971d62fe71efa2ae9db3721576167da1f9d0845d3224c9c712acd7dac350656b98a0ea663f4606d6e47778553058ca27b809c8e1aa9fa17b25a99d371702be5622aab67ec4a97ec7d12a957a98eb3656730fa74fcd0d6294f53f201d62cf8e5e27a4fbf5bf377ec61c01c7d85e0ada73120a56fa961208816252b46dfa07694df45f0ce495a3d669ee296b58c54b0a72d7567724e77479276e844e999db2b814b7ab2c9aa8099fe2252ab169", 0xdb}, {&(0x7f00000032c0)="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", 0x1000}, {&(0x7f00000042c0)="5b0d3d74fd", 0x5}, {&(0x7f0000004300)="12a2de3c2528607276c617c9aee15ee55f4be4aa060f230bf9725008d9cf422ee660957c18ff84aad15f7f5751e5e6f80b318fcd975ae104bdf42098ea08f6b2efedd697dc5f340b1a0fff8031e9b4011eff3b16e6e56ce163cb2d2f84058aa105becd7133b8efccc294b5b8a70282e594afa19a2cca93bf3d9e30eccd54726211c5f3e52f165fb380510dd1e14bb71995342fdd4ff69b19cb8efd3966ddbe0456a2f1374ec61417fe13bd98a2e29d175845dbc03717a54d41b0bcdfe24bec683208b3a6bf16bd7c9c5669a0b789b1f88a1d7e507604ac5740a08c45b5edf971bbfd7d517d050d6775", 0xe9}, {&(0x7f0000004400)="06a3a4ac3876d221dfaf771acd0fd52814f4d2be0ce7b16245b6b5100f8114bb5f83c77ee5acf9e69979394719d30b2b8dd6365d5bd4c841b30ff9593edd9ad07e96dd72d7b073d8e6763e6b9e14923d94e588ce1f2f65ddff2d10f42e838016a644ca89657c729a6db3e126484fe6c83fa012431e1e37d3189dbfa348c58b245a1598772e38315f540e66fecb8b822e97061c11d61b2240040432ea7d03031289a1942aa84c2b10753ba34053963eb524ab3c5fcb44b3ef34", 0xb9}, {&(0x7f00000044c0)="226f6fde8ebb3b34a37ee069103d4900a47402dc5f4761c7fc", 0x19}, {&(0x7f0000004500)="ded5a529ea0cedbb392ebf61a8d22d4eee7cc0cc1d83836a3e30c6a6fe03ae8ee0683b3bb9dbcae8539f07a3e619557974cb4822bb35ba02834f79f11cb1a44200890291be67912247e31714a43131d263778881efe504dbd5246586051bbd5a5ef005109b3b8e67efd082bead6047940744260d0c1c8f4f01e8882afbbba321cf", 0x81}, {&(0x7f00000045c0)="ee0826933b3c54edd252cb6bf7b0336c026cf87dc3e12ddc2c43b898c3cd2557ed601895a99e85718f02c93de33ba9b81598cd64f39d447ed7c3b5495fd8b8375d4be3d3137efe284366e8b99be508f0df9d9ced1b7f5483177ee40870aa47bd5052176f9ed8ac5a5e075a9ad4a19a4be54f9ef3e4185c40f371f0132100090c95592daadee22cf6769da50e4b7194e2c81bf9ba10ac90d0269bb75d", 0x9c}], 0x9, &(0x7f0000004740)=[{0x1010, 0x11c, 0x2, "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"}, {0x60, 0x0, 0x2, "0fdb0303bd6ef4921fe92cd837208c54a32dc491419c9ae63b12d18afc9be2c147022fd3041574bd7d629c859ead2a2ebc73b77ab8c4b584f107670a8b3a3915537fb73be2a0d9f10063"}, {0x18, 0x10b, 0x9, "9013d81aca0c9df1"}, {0xc8, 0x117, 0x10000, "3999fc26579578e84cc7f458f8b1f1afee704700630679678c25d6eee04cb4790aaa09bf7885fc51d5ffc7b7e30f609ad35b10b5f609b6ed98152f31ec37fcc732bac4b77e9f2e90b4bd61fb2416d2225fd240b46561dd995c165f4e27279d969c8373654540d82a3037f938fe63b94cc24235a6e46b357d05d763295ca4bdab08c3c20b9d01eb20776346b53ba476a552ab3ed0f0cd2cfa453b19bef505598093d652c62c4ee9ca2a8c655d856b3c6f11"}, {0xb8, 0x11e, 0x5, "338c2c7d048d521db9949a0d6144519d163eead89257af02655b92cc682a8f3465af2fd88720adef8df1d03a7f5d2ee2e8935b122c6cbb8ac85ee194ac7d17fc096cedacd383b5130ec545eded70df5a94732ebc3e31b788087acf2ed4cb18528c28a8ed10533b7ed8bd6e73ae9ea3950d92fa0dfbe14199f95a8ad87d55bab2eb54ff59135eb29681726792d5f420949ceeb4cda7d7b8c25020f6378b634380ae67"}], 0x1208}}, {{&(0x7f0000005980)=@pppoe={0x18, 0x0, {0x2, @empty, 'veth1_to_bond\x00'}}, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000005a00)="6ccd350ce866d1421d585a09396381edcf36fed48091a023a426a6114552bd9afa886d2304d5a9d4dec979ced417a4d7348aadace290b23ce0a79a2cd977cb06feef3235149e0b78eb82ecc3", 0x4c}, {&(0x7f0000005a80)="b7880b38f4a9", 0x6}, {&(0x7f0000005ac0)="9314f8e6079214bfb9278c31e37c6f", 0xf}, {&(0x7f0000005b00)="e04f33b7d6bedc71546a439ec36f470689c076c955d94f510b3a683a9cccd43e3dcb2275077c88eb638c48de6c8ca626ee1ab2e2447ebe36d01f97d456c875c0f286531811d5ca42dddfe2b6c5ed86a98d8fced67e2f10f79c8d75942b3d25af913e7d860df50ceda8a55cfa93069369912dd47cf7f1f1", 0x77}, {&(0x7f0000005b80)="619d190ba807e63cd05ec59fed66a4fd0f57c80843fe80bb3c319f16656d3c3d003b713c67ee74ecbf13afcb5617d7f4846d6223171c2011ec49c31cc02b47b3ca89478ebbb955d8fe7c4e85ccb54c24a2a4033a889b2a74f2eae9c63606cb6212436d4c", 0x64}, {&(0x7f0000005c00)="e953001561a2", 0x6}, {&(0x7f0000005c40)="7b557635a8237b24c21fd95279ca40ded9153685146a782243ac4fc0c77ce997cee5678fd5a6be958ad72d7b1188af245b10cabdb4822047b57b22d66c26a4d167b62367f661a39b518eb2778e88f617998647f65caa07914d3e0fc2824c89edd82c6f6329b9128f9c9202ea6822f1df443d489155b038c2f57d0557b630a58c1b666566bc82dd742710e1202178a8326dbadc27b31080", 0x97}, {&(0x7f0000005d00)="6aa3c575a7b07327e206f818e641d0438c82de1f1e2c068926f6dc0f17d34864da8c27b8a9ba16beaae5eb05920af9520dbcc7385971eedff83ba06cd6d2fc4048", 0x41}, {&(0x7f0000005d80)="dddd353df1da63afdae974ec301b2da46d0f74c29a3ac6ecdeab235961e6bb", 0x1f}], 0x9, &(0x7f0000005e80)=[{0xf8, 0x109, 0x7, "a54c822fd78d4bfd4d97938d022cb488440ca889779ec0707938daabbb7cbd7400464a4834a0ee6c78b945584f7592ac2fae6206be3491b50d4cab644eaef9bf818120c59e5cb96f722e0eeae2255ebb58453a83c67da018a196da0a55900e2362fec8e90f7d6c694889b2da090945477351de5bbc8d347d08ac9098df71ae8b4b5655a8c16b0dc6b83239a4fa4e00e92f8d690c8504f111d946824ea12b33707bbf28da96943f85c9ef58c6ea9e3a59e21957c5bbfe00e2cb76ad9f6a9ee5a9c793ea84c3461e4e41fbd0947c440f9007471aaa6fddb56b81e58ba5329aab4ff3323a0f"}, {0x30, 0x8e, 0x336, "82d1a17d663ccadd3947a81adcc270c754f7b2a53ccc2485245f8295e193"}], 0x128}}, {{&(0x7f0000006000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x4, 0x0, 0x1, {0xa, 0x4e20, 0x8001, @mcast1, 0x62}}}, 0x80, &(0x7f00000084c0)=[{&(0x7f0000006080)="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", 0x1000}, {&(0x7f0000007080)="013ded8a1d00a88950d3b9e62e74985fb2308187583f0dc1d093b39a5cd55c9e7f7be88952f8ca808b5ea9aa478d722314690b3953c4e65bc47eac5ec4903b7e98375fb823300f9beaa03698f885a1c8918089a365eeba459a02070d1f48e23ed68eb2759fd09f5a217e27c6c04accae6cd33a5314f0bc04b9292d103cb0f316c1842ab261e97b0adfff63a578629572fcc96f4a4fad7e0e08a6ef71085207b8fd529c000d554dde3764d0b5e452a13e56706db271e7c0ad6d398384e9438ba3116844db8ab9f0226575aa3b733443ee5333cdedbc0c95442a8369667ba5242f237b5e9e751c2c2e4bbe554328", 0xed}, {&(0x7f0000007180)="38b60698d2c725116ffd9173b0b9d1fafb0f8dad1376f702897953075fcd79e0049f5ff0d09ff64f27cee3f4a3e47e4f7cba1bdcb840a1b14c04914408b357f0ca6a140fcc9730ab5b78c92ff413ae4c0b8c96c33d27dc6d14c69a5993682f3a8bf9800493c1a021c57c910d75ea5746a51e624a7c0f99b2b49c677ffaff761452491f2b9db976c5a09eda7ee0faa8cd331f7161776cef0733b8cc508323f06b18ac64265c074e4ee068d71bc4452947f18b62505b4644939e4d18496010", 0xbe}, {&(0x7f0000007240)="0016f406d8ff4beb8bea41fd3e05ea34fed4218145cc866f4037cb34a4b6ab4a4ab181e7433409d0d37001d3163144504e1378913f583932e344f5fcd9a81556038e5877d12b8acb63fa9a7b6b468b2d7c4d190d2bd56da59b420e5366695c18b86e6b255044dca9e2396bb47cf140bf65309c6119a2694675969a9e93b3d8e6c290dae0186d34318ea601d65d603e00bfe6bd4d0817141339440235d3a08d81f03961b86ce4d0f9c24e13ede156317778839e043b4af0f47e62c0820d4a0a7627a5bb898ad06a466736c355569ef58f3bd371236839", 0xd6}, {&(0x7f0000007340)="48220b521ebc373e58c4265dc7b485df1690e1bea189a2786488576ca338ee1601cfa0660dbbc87b2ec83e168cdf96a55b3892434fe1b68976b6c4a63320ca1351ab8bc9ec72bd6e52", 0x49}, {&(0x7f00000073c0)="4a85b09c51747b27ba783075fc126b634d13083478e96469892e0dc0986225104d61e021554c470392a568f2049cadc5b062ef9b19deed1caa9cfb9a2fbe", 0x3e}, {&(0x7f0000007400)="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", 0x1000}, {&(0x7f0000008400)="71a151a98a2126477b75eed924197c42f9508e4fca5cb60cd3542093aff649031640a11f46529db0fb618cebf7fc52f285e5af78a35506be599b0337b9b3ecacef7564bdf915fe7e3ae4e565ea22321774626ec9f67656f2f88eba54b847d485a2f945e9e23813a9468d528fb19376f640f7e11dc57a6c760a1c298dba43b0d28e38d46069496901", 0x88}], 0x8, &(0x7f0000008540)=[{0x18, 0x117, 0x100, 'Lm('}, {0xa0, 0x84, 0xffff, "2554c310f15d5ec6ad1e53545f0f88e94fcc03899f79cd8dc13e648bb97eb890ee5a12dbf123e05567816f59a8d9c1f52681bdf3f3a869c4131d2605a7bf4a9e8806a583eaf7c452794bdef76f14f0e3d370276077a3f730243276ff33c70e659583bf8cc7d63b249ebb0ab9a5f004a73b95a4069718fb7ab4451789229ed03f5d2bfb67ba3f6208d245"}, {0x28, 0x88, 0x8, "7282ad8148b369cb9247e17fce0a161eae"}, {0x108, 0x13f, 0x1, "b75158b45011801ae47fba3db31d6017d4ecd52ffda3cf6a34735f9aee1dae6ba103770f1c21995db88c9b5722dd213c9bcdfc3f77efd616e04f5fb4b85812974f8a2f358f54ed816c211a8a43c772980ba3b3fd5c4fbe95ad3d6748526cec1f17d8150c4132394feec7ff14440a5ed6c2276626a37807d5dbd43ce730ada2217f8ec5736cb1bd4a1ad1977083b3a556ace89345545794e4420a1e0ce56094aee21d786736f520f03becafe89381c038ad46d87f56490362466ddf7bb403ef2c9e6f68263b9eb80aa2e1899fe16efc87d89b705bbd449406f46c47d9b9ce661879d7ca22da9b8c7c391a49990d1c3fe1d5021374fd87"}, {0x108, 0x6, 0x2, "af40ddafae4bd5ac7824858ebf51cb572d1bd1ce9aaea1a0cfe44036c611083df4c6ca35d8463d44eeb087110f9650aa99639d566a9502d011000e9259b0bee158f54ebaa92eec53940ff54ddeee9d3e778171bc47a9f1c3b678e2770c82d282c750537738a05694a877e650108ee0bf7cd1ab4e0b4d391456146834751f6134ec9006d738b5db4d683f253e3e9642fcb42cb8dad93b44e181a718f89bbcf1dcd7a448bf2fb3e99ffb75cc3072d0f552f10da8cb97bb8b542f78253c7cec1c213a063a0716e3e202811ad65c3a8e8ff5120cf3d6ea95954792cc97080a5dd462a5f09cae8d81c3ec545193f54e7e3cb95ddc"}, {0xd8, 0x103, 0xfffffffffffffc00, "6d94e3d9062646ebfcbbdc7276d0c255d6f9c9ea647b6ab8047b9c7ccbc0246358627029958513b137c43fa0249e61c279c37c56cf9d7a5932bbca6b55eb4b2108d3571bab50c035284ab291cf19a9785f01838f1b28ed04fc86b7fc87cca3474293f5c9da260d582a0ca73632202b2ae3e956b3258275db6fc0c91bd6813f2e3c4b607f48bb6a2de696cce2afbf5653409dcfba8d454f288bf12db79ed9f797a8d94c3f5cee6a2e28c64da2c1a33b622e89e77a57461b7f717e4d39dc1483dfbd"}], 0x3c8}}, {{&(0x7f0000008940)=@vsock={0x28, 0x0, 0xffffffff, @my=0x0}, 0x80, &(0x7f0000008c80)=[{&(0x7f00000089c0)="80874bf3e4626c61aa8eeab7de5657be8de731b074a0d166429b52df616464078bbd032b0e8e84e203e516a82e5f6f9fdaaf13ea9b7b5533870b", 0x3a}, {&(0x7f0000008a00)="8e1c05813b82a6422ab1857d8fee5f024a51f184c645029738538bb609710e1d7e056ba19360df3b0b9af04358453eb8ace8fd573028913c5320f17716e6aff5e5b4eff86761", 0x46}, {&(0x7f0000008a80)="2e204e484a8c5aecd06663db6b0e41603fca73c3b075aa3c8a461d6e9f6faec79774d4aef9f9f1e86cf9313367d7b020e8fec9b21f5e70502de61790d8d6affdd6b2506dfdf897db750970143498931e7436733c7c1f0023047c", 0x5a}, {&(0x7f0000008b00)="205bbefba3975cf1df3e301ace250de4f5d93af28fe6711319f63489eda3639f39e615182e0245dd4befac2aed59e2bb3783ea39a51686db52f604949554d0e4e5dd2d7baba1877dd4877a5cffc47c99dacf564db496ec85111dfb8fe170d00104f84447ecee1260503a6cca98f19e5dbdac7d31c8695f926f7ad9a78c8014bb570e8b0e3d214b5004dab4860fc976f506d0d8ba277207459a8f4ba1367c93e9866e08a437f24821871c12d36eb166fc45c3b080740b4a0327fed0bc93bb39d534f9a6dca982773e4df176fcafa976d11099444cab", 0xd5}, {&(0x7f0000008c00)="399a1586cdbbabf6e42d7fbd6358fb6eeac9c63c78081f632ff15b4e96e879b7af8966f41e81cf16b728ae47613a70c2331b88efa7c40a28cae935e408fcc1689915715045f809f73ba8ffbd676b5632dd35ccb5c91be0afffb92fd0825be8dcaa2e9e6c814099808bf1113089cda277090a", 0x72}], 0x5, &(0x7f0000008d00)=[{0x10, 0x13b, 0x6}, {0x38, 0x101, 0x40, "9c6833076bd24bfa1012c12de66bce1bf854b6e2eda347b2a64b1f3c91421f18dedc56541670"}, {0x108, 0x117, 0x5, "51d9742bb2683fbc12cdcca1039455bbbe0d88af73f9feeb7ce58f7e8502c43b2b4313096815391755aa330d3e6f7436fe03faaa06724fc24159003b6d6c4c3292b2f4865bccf6e29e420a550d1c333590036b4a2ae58213defee43c33384e7034793eab63cf7eb535e06a090c891f7c9cde3205119c59cc57faedde58186778ba25ebe56d6fa6ce0d16647ad79181a9b8b7f5bb5a82816a827960e0a75c91fd861a8bb4a22e63b3cc59f3b65efd8fe221f059e07386a3a7dc96753213a96547a4c549c2782c0e12a520011e05ee20dcb242cba98cfb901743a546e8dfbc47b683da47216207d5e7b3766066cc81e649fa9a"}, {0x40, 0x1, 0x495, "59bef56232a70d755a67ec055897a25d738b94d85648b22cc43e808e66a7705ae20951aa939acc6e88e05c4ce7"}, {0x1010, 0x0, 0xffffffff, "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"}], 0x11a0}}, {{&(0x7f0000009ec0)=@rc={0x1f, {0x6, 0x7, 0xfff, 0x2, 0xff, 0x40}, 0x7}, 0x80, &(0x7f000000b000)=[{&(0x7f0000009f40)="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", 0x1000}, {&(0x7f000000af40)="399927fddf3aca40b9548951a0", 0xd}, {&(0x7f000000af80)="2faedb8b8071f1c253c39c3c2debfb8dd77800bb9093de4a5b579462d1ee670716bd2184975935ae36a1fc5045bfda83e3237a132ed6d933ad5d67617d28b6060f2ba35b5ec5b3a6cf263221a0d06b89b278eed49791b450ab6829c157b3094ed9c93bd65ff9", 0x66}], 0x3, &(0x7f000000b040)=[{0xb8, 0x1, 0x4, "32e52f36c1555da68c0c56360da64a70fffd2c534c32986821559472e9a77e3a94c9000ceda4575957bf273692566249f94f7b3bf0aad56e98a589ecd6cc7c0c69a4e9cfe513ab17f68ad8970f73d7ef7940d3da15860f758a54574502e2e1355394728fb9a90ad48fc1ba4f67ebd4e1bafe31ac843bdcc3702040d147d11f9f2c8ca42215a8c42bc67cb0a5574ac6af7e7c2b41d08405b1d5048cadb7743a0614866f04a4c9f2"}], 0xb8}}, {{&(0x7f000000b100)=@vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x80, &(0x7f000000b300)=[{&(0x7f000000b180)="f291a9927d4e5134cac26d2ca3428699b1329173194b664e62ed1875ddae40fe2985689e51d102ea36ee6d3c8517d14aee5f4ba5ed173c34792451b4a1254f7e408670fdc58a01ab937040831f2cba02cd0d3bc95b96996331595c873adf182ec487813d2d744bd033abc97a4bf7f39d50445145486c3329fe31120afa56ec7a6e08a7b0200013716085c638732303d633f24ca74630b1fb9426897fd6ae16a81b2183dfca7d96c72400bf050f691048912ac3ebbf7068a5f4448cc5a98dcd3221c5544333e60841af95f50cdcfe78b43ec04608c6d3c8c71ccb17f958d192948d1f92", 0xe3}, {&(0x7f000000b280)="2c94d4384e36ebb7d88bfe2b8a8aadcc3f8f4c2ec10c1f7fec8e8a0556060e8468b414ed465e9abd0002f4d2aa8413aacb338dd163", 0x35}, {&(0x7f000000b2c0)="192d612903dd70f1c3605c9c863f73bce80a3fe3daf2f0f2d28350669c49c80589c30c4123e7e21b0237c2509d527032", 0x30}], 0x3}}, {{&(0x7f000000b340)=@rc={0x1f, {0x2, 0x5, 0x80, 0x7, 0x1, 0x774d}, 0x5}, 0x80, &(0x7f000000b700)=[{&(0x7f000000b3c0)}, {&(0x7f000000b400)="d5a9bda6441f6a8367e93d9eb3b1a900de91e8a1cb1a71d07278b31cc03a4f010ed21db57c3aac063bc345e078f7cebc6405e4d7fe79c70feb20b4a36d6f71bf023bbc5d7b2a92e54053e3524d727e208eaa9abad7781eab025b1d9b9711deef5b583a695f142edfad4fc09e", 0x6c}, {&(0x7f000000b480)="809e42a177a7383789868dcd3b08ab28c877be92ed120da115de051142722e6414a0920fa53895dae5c8c8d4cf9fe8cf005dcb6a843dd0961aa4547b1304ad7090fbf0532fd52555ca5a21971aab224b05bc9efdb98f4494b0f77d9f8af78b6db1d037092d8cfe7bc92ff4acf6fcc78bec462315aabf722e5a53b2cb432b20d5d1a38e4f37214178c88481efb862fe8a5985db67df77cb1037baa194d4f0457f5c84a6f4ac068fc5589ba31eb6c205654b252e1028273c17375a7323478d00bd6e2ec8d5ebc3b804079cd5267739d47f089b7c34a95f7f", 0xd7}, {&(0x7f000000b580)="37f1e74f36e9bcb6f6d80da2cc6fdb52737de1835f7d78777b2508c37e293fab16cd7d215d4952125f2e6d5cabbb74105f4b55c51e17ad2eb4eabc982b1701071c54f13cc8b1383287072318d6f8608547ab0586fef30ea16ec5306b8cd90eccd109846495f4acfed67fa94484d85cee6d1c98de1ba6c9618d84e04e68210aff86b56c53", 0x84}, {&(0x7f000000b640)="bc952afce41ace417c370cecb9b8978c31bdc69433e305894e97a9c0e4422625a946260a7d69f642051fe559148e8e2002bdbbb161251f", 0x37}, {&(0x7f000000b680)="e24b55e93efd166de6a7c251be01298d24e53a8d8e47620d6900ed2977a8749edbe0075f57d67ede5cd9c5044278ced3dcd6f0bb61c525b4b786ef73f01ea8f24a0d8db5ab1a72", 0x47}], 0x6, &(0x7f000000b780)=[{0x40, 0x10b, 0x6, "26a3be66749c1d2d0d50d7c58f1231932d5f5c0a5f1cf022344e9bb75f338db8715f58242f15aba708b2"}, {0x90, 0x10b, 0x1, "b3138ce835603a0321bbc0c261ad87b373efe5824eaabc38b4689af878051f82b83c299ca98a38dc6ae96ca19643845004393fdfbd726486acae0bb030b69c450b02052c1985f1a897ccc2be187cc2d0f64e833d09852fad468e797e1a1dcd381e4063fe2a0dc8ce51236648a9b44283f114ca64db13849b978132"}], 0xd0}}], 0x9, 0x20000010) [ 419.245902][ T5873] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:45:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x03\xe8\x00', 0x43732e5398416f17}) [ 419.293094][ T5873] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 419.326731][ T5873] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 419.381483][ T5873] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 419.413265][ T5873] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 419.442005][ T5995] UBIFS error (pid: 5995): cannot open "./file0", error -22 [ 419.461786][ T5995] UBIFS error (pid: 5995): cannot open "./file0", error -22 [ 419.475056][ T5873] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 419.548610][ T5873] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 419.593680][ T5873] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 419.650191][ T5873] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 419.659722][ T5873] XFS (loop0): SB validate failed with error -117. 08:45:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 08:45:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 08:45:05 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0xa) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x9) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000240)=0x2) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x80000000}, &(0x7f00000001c0)=0xc) 08:45:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xdd\xfd\x02\x00', 0x43732e5398416f17}) 08:45:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 420.065483][ T6111] UBIFS error (pid: 6111): cannot open "./file0", error -22 08:45:05 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r1, 0x12}}, 0x10) prctl$PR_GET_SECCOMP(0x15) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 420.325456][ T6118] XFS (loop1): device supports 512 byte sectors (not 0) 08:45:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xde\xfd\x02\x00', 0x43732e5398416f17}) 08:45:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 420.468231][ T6231] XFS (loop0): SB sanity check failed [ 420.488283][ T6231] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = gettid() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x1, 0xffffffff, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xb, 0x8, 0x4, 0xbb1, 0x5, 0x8, 0x9, 0x7, 0x7, 0x5, 0xa2e, 0x7a, 0x200, 0x101, 0x7, 0x5, 0x800, 0xfffffffffffffffb, 0x1f, 0xffffffffffffffff, 0x400, 0x5, 0x4, 0x6, 0xff, 0x6, 0xdc8, 0x4, 0x8, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000000100), 0x5}, 0x2000, 0x100000001, 0x8001, 0x0, 0x7, 0xc27a, 0x101}, r0, 0xc, r1, 0x2) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000480)=0x0, &(0x7f00000004c0), &(0x7f0000000500)) umount2(&(0x7f00000005c0)='./file0\x00', 0xc) write$P9_RSTATu(r1, &(0x7f0000000540)={0x7b, 0x7d, 0x2, {{0x0, 0x59, 0x1000, 0x8, {0x8, 0x4, 0x5}, 0x89000000, 0xe2, 0x71, 0x8a, 0xb, '/dev/vsock\x00', 0x9, 'vboxnet1-', 0x7, 'keyring', 0xb, '/dev/vsock\x00'}, 0xd, 'security.evm\x00', r2, r3, r4}}, 0x7b) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "11f32b9685e78fc210254efee750f6bc81e20095"}, 0x15, 0x3) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 420.549144][ T6231] XFS (loop0): Unmount and run xfs_repair [ 420.592102][ T6231] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 420.612779][ T6231] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 420.689818][ T6231] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 420.698110][ T6347] UBIFS error (pid: 6347): cannot open "./file0", error -22 [ 420.726264][ T6231] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 420.795218][ T6231] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 420.831028][ T6231] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 420.879075][ T6231] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 420.915384][ T6231] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 420.936892][ T6231] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 420.958279][ T6231] XFS (loop0): SB validate failed with error -117. 08:45:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 08:45:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:06 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 08:45:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:06 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xb, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="2b6ded5143bb188047e5664479c105a0e63ff0cd6db0181b76745dd1a06687dd1a11e936234ed02e9737719f0d6f6d298e9fab1ac7be6d2e887be68100f901a70035278e1beb9cf4c6dd611907d597187a2fd87a4ad0e227e1b9c336249a0c950c6818b851dda05e69020780dd994939987610ea2bf28781770dbaefc8be882e4699b79f9f7eb02fc17e85ec32ed5ac588", 0x91, 0x1c9}, {&(0x7f0000000180)="a451440858856a9df83d87e0b63ab8d51666f231c828a7bca0c398cba56b55c78f670f826543d1e3303034ebe997c56ecd56eaf5cb98030fe5237d72a416234a33e49726ca4272e8006dde09596e14197da630", 0x53, 0x8}, {&(0x7f0000000580)="9057df035aa4ebf98303985a575ebf617871d91765878d43cf754bdb55424c743038b9abb4f099ecf2986d151d0e232e4c2ef7e9561191ecbbac6c246efebcbab63ea7940d1eb57d9b4c7ed017f41a446a4340b968a39bfae44ac0a49a5cb9434f6aac88961e982497dd07e2b04929ec7e6461a28fc1c62a40f488afd75f1a98fd7b594231ad67ac0f68c7a78b4280bf6fa50b905f45f4a2ebc26f3d3d3f7e67419b839e901bc7", 0xa7, 0x9}], 0x1000002, &(0x7f0000000500)={[], [{@euid_gt={'euid>', r0}}, {@appraise_type='appraise_type=imasig'}, {@smackfsfloor={'smackfsfloor', 0x3d, '.&}security'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @multicast1}, &(0x7f0000000300)=0x10, 0x0) sendmsg$sock(r1, &(0x7f0000000340)={&(0x7f0000000640)=@pppoe={0x18, 0x0, {0x1, @local, 'vxcan1\x00'}}, 0x80, &(0x7f0000001940)=[{&(0x7f00000006c0)="47af12a1febb6c8fa3a40527e023924cf91141e7e7761a0efd24acf18198028462448303f31badc4c73edef999fcaff058fcc0ab78512bca3ce0db9916976a23c9b58e3d794537a87b87b7c0e116dcec1187adfcff68ebf46dfc6212e59d7eee22a116969d9780d816ed926690c8d2a3c1c0963de7cd", 0x76}, {&(0x7f0000000740)="a24c751c7d915546365c487ddcd4930b45c6f49cec6a707364cd9953dd90497bf234ce79939c080de4b5e7a8edfe167a9c12e6079565edb999943f45a340c0790c71aecfdd98aac0655c747e4d59845a2b2363e1e2e52709f000fdde92ab1fefe61cf1a77528f16b209861c7f860a5a6afabb913dd060920fe1f", 0x7a}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="d8d59a05eaa367c5ebd0b82077d32bae4e0718a2977fddb92171f4a82be5de2c449873a94de919642abf4b272756529813a817581c750073d3835687322609f2675c5b24c22e7af9b3c196b87d0ff318c363ca7d99b42d564ab8459a8bbf1f366e051c74e4443f743405c84eedc82a06f28bf656eecb6c2f65db0854f7073e7f83f329b08b309f8bc75d4c6a412cdce65afaaabdb1bc18e73e8ba96c934412733b47be446a5b8deb2fcec1baec57958bd6ba36d3de7b539f023546757bb1fa52addc4d51ca594a0799e0e66987ff993e825f6907", 0xd4}, {&(0x7f00000018c0)="2b85a8725260c346a197cfa759e21ef9666542509309762ce869ac41b785395dd64e300c3ba435e1185f1e947e6fa58cc5ee00a356342ab720e90086206f4eeab6122c23826d2a281d6971889d96e0816a77a45920ef6cb3", 0x58}], 0x5, &(0x7f00000019c0)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x703}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x48}, 0x1) lsetxattr$trusted_overlay_opaque(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)='trusted.overlay.opaque\x00', &(0x7f0000001ac0)='y\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xdf\xfd\x02\x00', 0x43732e5398416f17}) [ 421.392587][ T6474] UBIFS error (pid: 6474): cannot open "./file0", error -22 08:45:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x40080, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f00000001c0)) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xc) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x0, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x840) [ 421.477519][ T6467] XFS (loop1): device supports 512 byte sectors (not 0) 08:45:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 421.530095][ T12] XFS (loop0): SB sanity check failed [ 421.552194][ T12] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 421.574805][ T12] XFS (loop0): Unmount and run xfs_repair [ 421.592231][ T12] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 421.644597][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:45:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe0\xfd\x02\x00', 0x43732e5398416f17}) [ 421.695340][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 421.728971][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 08:45:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000f00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 421.781176][ T6607] UBIFS error (pid: 6607): cannot open "./file0", error -22 [ 421.781599][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 421.809973][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 08:45:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 421.881599][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 421.944299][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 422.012295][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 422.050526][ T6567] XFS (loop0): SB validate failed with error -117. [ 422.090054][ T6710] UBIFS error (pid: 6710): cannot open "./file0", error -22 08:45:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe1\xfd\x02\x00', 0x43732e5398416f17}) 08:45:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:07 executing program 4: lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100)=0x153, 0x80000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) 08:45:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 422.471805][ T6729] UBIFS error (pid: 6729): cannot open "./file0", error -22 08:45:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x404200, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080)={0xe, 0xa, 0x7, 0xffffffff, 0x5, "d3b86a50bc"}, 0x11) [ 422.583013][ T6724] XFS (loop1): SB sanity check failed [ 422.588490][ T6724] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 422.709396][ T6812] XFS (loop0): SB sanity check failed [ 422.736121][ T6812] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 422.750561][ T6724] XFS (loop1): Unmount and run xfs_repair [ 422.804292][ T6724] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 422.847753][ T6812] XFS (loop0): Unmount and run xfs_repair [ 422.858496][ T6724] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 422.876737][ T6863] UBIFS error (pid: 6863): cannot open "./file0", error -22 [ 422.880787][ T6812] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:45:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 422.909058][ T6812] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 422.925685][ T6724] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 422.935263][ T6812] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:45:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) [ 422.979592][ T6724] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 08:45:08 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 423.023247][ T6724] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 423.050460][ T6812] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 423.129197][ T6812] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 423.138399][ T6724] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 423.157250][ T6724] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 423.199358][ T6812] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 423.206165][ T6960] UBIFS error (pid: 6960): cannot open "./file0", error -22 [ 423.216888][ T6724] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 423.256563][ T6812] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 423.309118][ T6724] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 423.313479][ T6812] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 423.327486][ T6724] XFS (loop1): SB validate failed with error -117. [ 423.339041][ T6812] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 423.352260][ T6812] XFS (loop0): SB validate failed with error -117. 08:45:08 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe2\xfd\x02\x00', 0x43732e5398416f17}) 08:45:08 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101900, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80201, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:08 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:09 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000002c0), 0x8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f0000000400)) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) [ 423.854131][ T7079] UBIFS error (pid: 7079): cannot open "./file0", error -22 08:45:09 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xc0000, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 424.027240][ T8916] XFS (loop1): SB sanity check failed [ 424.038710][ T8916] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 424.133717][ T8916] XFS (loop1): Unmount and run xfs_repair [ 424.166460][ T8916] XFS (loop1): First 128 bytes of corrupted metadata buffer: 08:45:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe3\xfd\x02\x00', 0x43732e5398416f17}) [ 424.209827][ T8916] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 424.277326][ T8916] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 424.340608][ T8916] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 08:45:09 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@mpls_getnetconf={0x1c, 0x52, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x737}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4004) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 424.363894][ T7282] UBIFS error (pid: 7282): cannot open "./file0", error -22 [ 424.388681][ T8916] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 424.504808][ T8916] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 424.555464][ T8916] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 424.596594][ T8916] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 424.622273][ T8916] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 424.632409][ T7102] XFS (loop1): SB validate failed with error -117. 08:45:10 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:10 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ptype\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x68000000) 08:45:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101840, 0x0) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000100)="785ad274f1d1d99e5979b5cc59a54328080d1a15d42e52ad1ff06ad115da3db72770150bce7c30983e989a08146a9d2a764e253319e2b53769a6213a018c3781764176be2d4861c337315417df2764e69cce49e4a7628d03c329622d5868638be1f216e2f700132535eb7fc26c282e53df8cff53e4bc87c7735dc9fdc0d7cc86e5c72d43d4207cde7caf6448335ab12043135c27a12ac55afb764c7726bb1cdf0652e1e3b71239c27e32fe963606f7621245fab1a8ade521d29b42797fc7a6e379d8c3f98b544fec82ee2f969428754f166047a95f7a85cc7229925b62f2c50ae6e786addb5644bee5821d29612c0b06114404e86c19c33f6fad163d40", 0xfd) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0xc977}) 08:45:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe4\xfd\x02\x00', 0x43732e5398416f17}) [ 425.047677][ T7426] UBIFS error (pid: 7426): cannot open "./file0", error -22 08:45:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) 08:45:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 425.224908][ T7535] UBIFS error (pid: 7535): cannot open "./file0", error -22 [ 425.345497][ T8916] XFS (loop1): SB sanity check failed [ 425.360096][ T8916] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe5\xfd\x02\x00', 0x43732e5398416f17}) 08:45:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000001c000c00020008000400000000004a8c24d15e0d374a7576e455ef23c228083024a86ce767951de8408e95ef482af64f63cc631e1a37f4412f2c10f5eb875a8e387f8a258e63c7b13156d87f8f749d74d4bc6a946a31d803005249c60e69958e272f04a1463614fbc2e2c8be077fe9cbcec9be911e0565dfbfca8a324e8f69a01af6e1b747130e37922e1c66d888b1e9bc403d7e5b84884b49603e574458620c86b6e10d9f42eaa7642d721d5460e915557cf47791c1eac2ee533e9e1bfc218b1a3d6b79cb26582970e5a4c18b57e6f1"], 0x1}}, 0x0) [ 425.423988][ T8916] XFS (loop1): Unmount and run xfs_repair [ 425.443251][ T8916] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 425.481979][ T8916] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 425.519102][ T8916] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 425.543060][ T8916] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 425.568268][ T7610] UBIFS error (pid: 7610): cannot open "./file0", error -22 [ 425.603886][ T8916] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 425.692899][ T8916] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 425.711472][ T8916] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 425.723276][ T8916] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 425.757682][ T8916] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 425.785430][ T7506] XFS (loop1): SB validate failed with error -117. 08:45:11 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 08:45:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$instantiate(0xc, r0, &(0x7f00000000c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'trusted:', 'ubifs\x00'}, 0x1f, 0xfffffffffffffffd) 08:45:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000800)) getgroups(0x3, &(0x7f0000000580)=[0xee00, 0xee00, 0xee00]) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x20801) write$FUSE_ATTR(r0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x8c\xe8\xa4\xd9k\x1e\xdd\xdb)\f~\xde\xc1W\xf5\xc7[A\xadT\f\x9c\x15En\xd9\x80\x98aU\xae\ap\xd0\x7f\x00\xe6v\xff\x90\x81$u\x9a6jr\xf7~\xe2\x9ctC\x1e%\xd0{G\xe7\xae\x80\x00\x82\xf5\x1f\xfeLv\'xpmk\xbc\x94\x8av\xd2\xb3\xa5\x1dd\x14\x1d)\xee\x8cr(<\x9a\xcdOV\xf7\xcf\x01\ao\xfd\xbe\f\xe2\xf6\b\xc1 +|', 0x1ff) socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000400)=""/180, 0x4}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x800) ioctl$sock_FIOGETOWN(r2, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='oom_score_adj\x00') syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x403) socket$alg(0x26, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000000200), 0x1a8) 08:45:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe6\xfd\x02\x00', 0x43732e5398416f17}) [ 426.195189][ T7671] UBIFS error (pid: 7671): cannot open "./file0", error -22 08:45:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000000000000) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) [ 426.482562][ T7747] XFS (loop1): SB sanity check failed [ 426.484079][ T7788] UBIFS error (pid: 7788): cannot open "./file0", error -22 08:45:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x2, 0x0) [ 426.525301][ T7747] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 426.612130][ T7747] XFS (loop1): Unmount and run xfs_repair [ 426.649599][ T7747] XFS (loop1): First 128 bytes of corrupted metadata buffer: 08:45:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe7\xfd\x02\x00', 0x43732e5398416f17}) [ 426.693749][ T7747] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 426.752495][ T7747] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:45:12 executing program 4: socket$inet(0x2, 0x200000002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffa, 0x3, 0x0, 0x0, 0x4b44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8) r2 = socket$inet6(0xa, 0x6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x42a000, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x6) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000040)="4afdfa758049251bc032369db6d535af3e30c82ab5ff09ab48e3698e5196f2e75e2dd6db7ce73c020200bb2d26d16b0352186431454f24c6e71a4559f0d97637e714fb15f7c257e039b1325e25689124d658051403001e8b090fcd74a9e4ce6198d3bd08d3a8b2e46941bacf6ddbd97ebc073d614ba5eeac510a2435c762bbcc8bf1ce348d594498438ef9ed2f3c7606c512830f7d5f51c307225a860d1f761101580facb4b653a27b23", 0xaa, 0x80, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/80, 0x50, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000001c0)=0x4) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) setsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f0000000100)={@loopback, @broadcast}, 0x8) [ 426.823675][ T7747] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 426.848979][ T7747] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 426.857880][ T7747] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 426.870324][ T7902] UBIFS error (pid: 7902): cannot open "./file0", error -22 [ 426.991708][ T7747] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 427.023093][ T7747] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 427.041628][ T7747] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 427.092408][ T7747] XFS (loop1): SB validate failed with error -117. 08:45:12 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 08:45:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000200), 0x8) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) 08:45:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x3, 0x0) 08:45:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe8\xfd\x02\x00', 0x43732e5398416f17}) 08:45:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000200), 0x8) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) 08:45:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4, 0x0) [ 427.510823][ T8019] UBIFS error (pid: 8019): cannot open "./file0", error -22 08:45:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 427.667309][ T12] XFS (loop1): SB sanity check failed [ 427.676680][ T12] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 427.754627][ T12] XFS (loop1): Unmount and run xfs_repair [ 427.794632][ T12] XFS (loop1): First 128 bytes of corrupted metadata buffer: 08:45:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe9\xfd\x02\x00', 0x43732e5398416f17}) [ 427.850558][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 427.869796][ T8172] UBIFS error (pid: 8172): cannot open "./file0", error -22 [ 427.887175][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 427.988358][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 428.035255][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 428.095386][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 428.138554][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 428.174424][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 428.193918][ T12] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 428.210433][ T8050] XFS (loop1): SB validate failed with error -117. [ 428.223725][ T8921] XFS (loop0): SB sanity check failed [ 428.229832][ T8921] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 428.242218][ T8921] XFS (loop0): Unmount and run xfs_repair [ 428.248044][ T8921] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 428.256124][ T8921] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 428.265411][ T8921] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 428.274911][ T8921] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 428.284197][ T8921] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 428.293508][ T8921] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 428.302909][ T8921] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 428.312187][ T8921] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 428.321714][ T8921] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 428.331236][ T8248] XFS (loop0): SB validate failed with error -117. 08:45:13 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 08:45:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x5, 0x0) 08:45:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xea\xfd\x02\x00', 0x43732e5398416f17}) 08:45:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6, 0x0) [ 428.634514][ T8301] UBIFS error (pid: 8301): cannot open "./file0", error -22 08:45:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 08:45:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xeb\xfd\x02\x00', 0x43732e5398416f17}) [ 428.912596][ T8382] UBIFS error (pid: 8382): cannot open "./file0", error -22 [ 428.950455][ T8381] XFS (loop1): SB sanity check failed [ 428.975880][ T8381] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7, 0x0) [ 428.999246][ T8381] XFS (loop1): Unmount and run xfs_repair [ 429.018606][ T8381] XFS (loop1): First 128 bytes of corrupted metadata buffer: 08:45:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 429.117838][ T8381] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 429.198778][ T8381] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 429.269088][ T8381] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 429.278138][ T8381] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 429.290779][ T8571] UBIFS error (pid: 8571): cannot open "./file0", error -22 [ 429.317993][ T8381] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 429.357723][ T8381] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 429.373323][ T8381] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 429.383302][ T8921] XFS (loop0): SB sanity check failed [ 429.394339][ T8381] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 429.397177][ T8921] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 429.403539][ T8381] XFS (loop1): SB validate failed with error -117. [ 429.477595][ T8921] XFS (loop0): Unmount and run xfs_repair [ 429.494930][ T8921] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 429.502868][ T8921] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 429.512362][ T8921] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 429.521845][ T8921] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 429.548844][ T8921] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 429.558490][ T8921] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 429.582651][ T8921] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 429.594497][ T8921] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 429.604008][ T8921] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 429.613458][ T8513] XFS (loop0): SB validate failed with error -117. 08:45:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5001e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x8, 0x0) 08:45:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x01\x00', 0x43732e5398416f17}) 08:45:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x10, 0x0) [ 429.861413][ T8670] UBIFS error (pid: 8670): cannot open "./file0", error -22 08:45:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:15 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 430.089984][ T8727] XFS (loop1): SB sanity check failed [ 430.123489][ T8727] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x02\x00', 0x43732e5398416f17}) 08:45:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 430.186914][ T8727] XFS (loop1): Unmount and run xfs_repair [ 430.209745][ T8766] UBIFS error (pid: 8766): cannot open "./file0", error -22 [ 430.219019][ T8727] XFS (loop1): First 128 bytes of corrupted metadata buffer: 08:45:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x48, 0x0) [ 430.422604][ T8727] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 430.446671][ T8857] XFS (loop0): SB sanity check failed [ 430.449028][ T8727] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 430.462129][ T8857] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 430.490519][ T8727] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 430.512174][ T8857] XFS (loop0): Unmount and run xfs_repair [ 430.540051][ T8857] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 430.554923][ T8727] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 430.579486][ T8971] UBIFS error (pid: 8971): cannot open "./file0", error -22 [ 430.601322][ T8857] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 430.603971][ T8727] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 430.659136][ T8857] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 430.668036][ T8857] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 430.701645][ T8727] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 430.718195][ T8727] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 430.733295][ T8727] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 430.772427][ T8727] XFS (loop1): SB validate failed with error -117. [ 430.789901][ T8857] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 430.807587][ T8857] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 430.816972][ T8857] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 430.833072][ T8857] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 430.844225][ T8857] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 430.854602][ T8857] XFS (loop0): SB validate failed with error -117. 08:45:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4c, 0x0) 08:45:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x03\x00', 0x43732e5398416f17}) 08:45:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 431.159710][ T9028] UBIFS error (pid: 9028): cannot open "./file0", error -22 08:45:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x68, 0x0) 08:45:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000733eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 431.365162][ T9098] XFS (loop1): SB sanity check failed [ 431.381806][ T9098] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 431.394279][ T9098] XFS (loop1): Unmount and run xfs_repair [ 431.403005][ T9098] XFS (loop1): First 128 bytes of corrupted metadata buffer: 08:45:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x04\x00', 0x43732e5398416f17}) [ 431.414581][ T9098] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 431.423999][ T9098] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 431.433824][ T9098] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 431.537633][ T9098] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6c, 0x0) [ 431.596668][ T9098] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 431.674731][ T9098] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 431.723338][ T9098] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 08:45:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000733eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 431.785422][ T9149] XFS (loop0): SB sanity check failed [ 431.786041][ T9098] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 431.806688][ T9149] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 431.853799][ T9098] XFS (loop1): SB validate failed with error -117. [ 431.926627][ T9149] XFS (loop0): Unmount and run xfs_repair 08:45:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x74, 0x0) [ 431.967409][ T9149] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 431.989038][ T9149] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:45:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x05\x00', 0x43732e5398416f17}) [ 432.051253][ T9149] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 432.117021][ T9149] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 432.176229][ T9149] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a000000000733eb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5000000010000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 432.216674][ T9149] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 08:45:17 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 08:45:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7a, 0x0) 08:45:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 432.277332][ T9149] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 432.330453][ T9149] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 432.418437][ T9149] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 432.502730][ T9149] XFS (loop0): SB validate failed with error -117. [ 432.687688][ T9462] XFS (loop1): SB sanity check failed [ 432.703383][ T9462] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 432.719039][ T9462] XFS (loop1): Unmount and run xfs_repair [ 432.724945][ T9462] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 432.733501][ T9462] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 432.742527][ T9462] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 432.751599][ T9462] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 432.760641][ T9462] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 432.769705][ T9462] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 432.778668][ T9462] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 432.787869][ T9462] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 432.803847][ T9462] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 432.815739][ T9462] XFS (loop1): SB validate failed with error -117. 08:45:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x06\x00', 0x43732e5398416f17}) 08:45:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf0, 0x0) 08:45:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 08:45:18 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x300, 0x0) 08:45:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 08:45:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\a\x00', 0x43732e5398416f17}) 08:45:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) [ 433.309307][ T9618] XFS (loop0): SB sanity check failed [ 433.310471][ T9632] UBIFS error (pid: 9632): cannot open "./file0", error -22 [ 433.314770][ T9618] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x500, 0x0) [ 433.369082][ T9618] XFS (loop0): Unmount and run xfs_repair [ 433.375711][ T9618] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:45:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 433.470253][ T9618] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:45:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 433.630797][ T9618] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 433.642031][ T9747] UBIFS error (pid: 9747): cannot open "./file0", error -22 [ 433.675217][ T9618] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 433.690874][ T9744] XFS (loop1): SB sanity check failed [ 433.705157][ T9618] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x600, 0x0) 08:45:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\b\x00', 0x43732e5398416f17}) [ 433.724271][ T9744] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 433.763402][ T9618] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 433.805509][ T9618] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 433.821525][ T9744] XFS (loop1): Unmount and run xfs_repair [ 433.843578][ T9618] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 433.857463][ T9744] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 433.859221][ T9618] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 433.921287][ T9744] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 433.960939][ T9618] XFS (loop0): SB validate failed with error -117. [ 433.971773][ T9744] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 433.972251][ T9864] UBIFS error (pid: 9864): cannot open "./file0", error -22 [ 434.016394][ T9744] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 434.053366][ T9744] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 434.136443][ T9744] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 434.155174][ T9744] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 434.202298][ T9744] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 434.217724][ T9744] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 434.228392][ T9744] XFS (loop1): SB validate failed with error -117. 08:45:19 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:19 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x700, 0x0) 08:45:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x1f\x00', 0x43732e5398416f17}) [ 434.396151][ T9879] UBIFS error (pid: 9879): cannot open "./file0", error -22 08:45:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x1020, 0x0) 08:45:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:19 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 08:45:19 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:19 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x2000, 0x0) 08:45:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00 \x00', 0x43732e5398416f17}) 08:45:20 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 434.879077][T10042] XFS (loop1): SB sanity check failed [ 434.893825][T10042] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 434.958693][T10042] XFS (loop1): Unmount and run xfs_repair 08:45:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x2010, 0x0) [ 435.008531][T10042] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 435.035747][T10042] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 435.109456][T10042] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:45:20 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) [ 435.167858][T10042] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 435.197708][T10042] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:45:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x0f&\x00', 0x43732e5398416f17}) [ 435.261825][T10042] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 08:45:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 435.341492][T10042] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 435.399134][T10042] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 435.435768][T10042] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 435.455877][T10042] XFS (loop1): SB validate failed with error -117. 08:45:21 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 08:45:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4000, 0x0) 08:45:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:45:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00@\x00', 0x43732e5398416f17}) [ 435.810416][T10355] UBIFS error (pid: 10355): cannot open "./file0", error -22 08:45:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4800, 0x0) [ 435.842240][T10355] UBIFS error (pid: 10355): cannot open "./file0", error -22 08:45:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:45:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 436.120526][T10478] UBIFS error (pid: 10478): cannot open "./file0", error -22 [ 436.122092][T10466] XFS (loop1): SB sanity check failed [ 436.149097][T10466] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4c00, 0x0) [ 436.190284][T10466] XFS (loop1): Unmount and run xfs_repair [ 436.208104][T10466] XFS (loop1): First 128 bytes of corrupted metadata buffer: 08:45:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00H\x00', 0x43732e5398416f17}) [ 436.265012][T10466] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 436.299020][T10466] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 436.356774][T10466] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 436.387004][T10590] UBIFS error (pid: 10590): cannot open "./file0", error -22 [ 436.554052][T10466] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 436.591154][T10466] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 436.605224][T10466] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 436.623920][T10466] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 436.635682][T10466] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 436.664895][T10466] XFS (loop1): SB validate failed with error -117. 08:45:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5002f00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', 0x0, 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6800, 0x0) 08:45:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00L\x00', 0x43732e5398416f17}) 08:45:22 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6c00, 0x0) 08:45:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 437.313546][T10721] XFS (loop1): Mounting V4 Filesystem 08:45:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 437.367354][T10721] XFS (loop1): empty log check failed [ 437.404441][T10721] XFS (loop1): log mount/recovery failed: error -5 08:45:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00h\x00', 0x43732e5398416f17}) 08:45:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7400, 0x0) [ 437.509146][T10721] XFS (loop1): log mount failed [ 437.564788][T10840] XFS (loop0): Invalid superblock magic number 08:45:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:22 executing program 4 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7a00, 0x0) 08:45:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:23 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00l\x00', 0x43732e5398416f17}) 08:45:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xedc0, 0x0) 08:45:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:23 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 438.063634][T11077] FAULT_INJECTION: forcing a failure. [ 438.063634][T11077] name failslab, interval 1, probability 0, space 0, times 0 [ 438.197692][T11077] CPU: 1 PID: 11077 Comm: syz-executor.1 Not tainted 5.2.0-rc7-next-20190701 #26 [ 438.208338][T11077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.218397][T11077] Call Trace: [ 438.221707][T11077] dump_stack+0x172/0x1f0 [ 438.226059][T11077] should_fail.cold+0xa/0x15 [ 438.230667][T11077] ? fault_create_debugfs_attr+0x180/0x180 [ 438.236579][T11077] ? ___might_sleep+0x163/0x280 [ 438.241450][T11077] __should_failslab+0x121/0x190 [ 438.246410][T11077] should_failslab+0x9/0x14 [ 438.250931][T11077] __kmalloc+0x2e0/0x770 [ 438.255189][T11077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 438.261439][T11077] ? fput_many+0x12c/0x1a0 [ 438.265870][T11077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.272119][T11077] ? strnlen_user+0x1ed/0x2e0 [ 438.276814][T11077] ? __x64_sys_memfd_create+0x13c/0x470 [ 438.292100][T11077] __x64_sys_memfd_create+0x13c/0x470 [ 438.297492][T11077] ? memfd_fcntl+0x18c0/0x18c0 [ 438.302273][T11077] ? do_syscall_64+0x26/0x6a0 [ 438.307012][T11077] ? lockdep_hardirqs_on+0x418/0x5d0 [ 438.312325][T11077] ? trace_hardirqs_on+0x67/0x240 [ 438.317364][T11077] do_syscall_64+0xfd/0x6a0 [ 438.321891][T11077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.327783][T11077] RIP: 0033:0x4597c9 [ 438.331681][T11077] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.353929][T11077] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 438.362465][T11077] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004597c9 [ 438.370482][T11077] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be6cc [ 438.378464][T11077] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 438.386446][T11077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e5afea6d4 08:45:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf000, 0x0) 08:45:23 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x162, &(0x7f0000000100), 0x2100000, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x8c3) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000240)={[{0x37, 0xca, 0x200, 0x5, 0x4, 0x10001, 0x9, 0x10001, 0x100, 0x9, 0x400, 0x2, 0x3}, {0x2, 0x7fff, 0x41c, 0x4bc3, 0x1000, 0x8, 0x0, 0x81, 0x1, 0x2, 0x80, 0x7ff, 0x5}, {0x6, 0x9498, 0x40, 0xff, 0x101, 0x6, 0x8, 0x7e, 0x4, 0x101, 0x0, 0x1, 0x100000000}], 0x3f}) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000100)=0x7) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x82, 0x0) fcntl$setpipe(r2, 0x407, 0x8001) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000040)={0x3}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x800, 0x0) [ 438.394425][T11077] R13: 00000000004c888d R14: 00000000004df4a0 R15: 0000000000000003 08:45:23 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 438.456410][T11081] XFS (loop0): Invalid superblock magic number [ 438.557029][T11208] FAULT_INJECTION: forcing a failure. [ 438.557029][T11208] name failslab, interval 1, probability 0, space 0, times 0 [ 438.589819][T11208] CPU: 0 PID: 11208 Comm: syz-executor.1 Not tainted 5.2.0-rc7-next-20190701 #26 [ 438.598978][T11208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.609047][T11208] Call Trace: [ 438.612357][T11208] dump_stack+0x172/0x1f0 [ 438.616704][T11208] should_fail.cold+0xa/0x15 [ 438.621320][T11208] ? fault_create_debugfs_attr+0x180/0x180 [ 438.627135][T11208] ? ___might_sleep+0x163/0x280 [ 438.632004][T11208] __should_failslab+0x121/0x190 [ 438.637053][T11208] ? shmem_destroy_inode+0x80/0x80 [ 438.642174][T11208] should_failslab+0x9/0x14 [ 438.646685][T11208] kmem_cache_alloc+0x2aa/0x710 [ 438.651546][T11208] ? __alloc_fd+0x487/0x620 [ 438.656062][T11208] ? shmem_destroy_inode+0x80/0x80 [ 438.661182][T11208] shmem_alloc_inode+0x1c/0x50 [ 438.665959][T11208] alloc_inode+0x68/0x1e0 [ 438.670303][T11208] new_inode_pseudo+0x19/0xf0 [ 438.674989][T11208] new_inode+0x1f/0x40 [ 438.679067][T11208] shmem_get_inode+0x84/0x7e0 [ 438.683758][T11208] __shmem_file_setup.part.0+0x7e/0x2b0 [ 438.689314][T11208] shmem_file_setup+0x66/0x90 [ 438.694007][T11208] __x64_sys_memfd_create+0x2a2/0x470 [ 438.699580][T11208] ? memfd_fcntl+0x18c0/0x18c0 [ 438.704361][T11208] ? do_syscall_64+0x26/0x6a0 [ 438.709049][T11208] ? lockdep_hardirqs_on+0x418/0x5d0 [ 438.714355][T11208] ? trace_hardirqs_on+0x67/0x240 [ 438.719387][T11208] do_syscall_64+0xfd/0x6a0 [ 438.723891][T11208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.729782][T11208] RIP: 0033:0x4597c9 [ 438.733679][T11208] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:45:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xff00, 0x0) 08:45:24 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x30100) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 438.753285][T11208] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 438.761701][T11208] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004597c9 [ 438.769693][T11208] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be6cc [ 438.777677][T11208] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 438.785642][T11208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e5afea6d4 [ 438.793697][T11208] R13: 00000000004c888d R14: 00000000004df4a0 R15: 0000000000000003 08:45:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 08:45:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00t\x00', 0x43732e5398416f17}) 08:45:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:24 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf0ffff, 0x0) 08:45:24 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x4, &(0x7f0000000280)=0x7f, 0x4) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 439.254116][T11437] FAULT_INJECTION: forcing a failure. [ 439.254116][T11437] name failslab, interval 1, probability 0, space 0, times 0 [ 439.298700][T11437] CPU: 0 PID: 11437 Comm: syz-executor.1 Not tainted 5.2.0-rc7-next-20190701 #26 [ 439.307857][T11437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.317933][T11437] Call Trace: [ 439.321237][T11437] dump_stack+0x172/0x1f0 [ 439.321261][T11437] should_fail.cold+0xa/0x15 [ 439.321284][T11437] ? fault_create_debugfs_attr+0x180/0x180 [ 439.321312][T11437] ? ___might_sleep+0x163/0x280 [ 439.340885][T11437] __should_failslab+0x121/0x190 [ 439.345872][T11437] should_failslab+0x9/0x14 [ 439.350391][T11437] kmem_cache_alloc+0x2aa/0x710 [ 439.355255][T11437] ? current_time+0x6b/0x140 [ 439.359857][T11437] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 439.365713][T11437] ? lockdep_hardirqs_on+0x418/0x5d0 [ 439.371004][T11437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.371023][T11437] ? timespec64_trunc+0xf0/0x180 [ 439.371041][T11437] __d_alloc+0x2e/0x8c0 [ 439.371063][T11437] d_alloc_pseudo+0x1e/0x70 [ 439.371081][T11437] alloc_file_pseudo+0xe2/0x280 [ 439.371098][T11437] ? alloc_file+0x4d0/0x4d0 [ 439.371119][T11437] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 439.382294][T11437] __shmem_file_setup.part.0+0x108/0x2b0 [ 439.382316][T11437] shmem_file_setup+0x66/0x90 [ 439.382337][T11437] __x64_sys_memfd_create+0x2a2/0x470 [ 439.382355][T11437] ? memfd_fcntl+0x18c0/0x18c0 [ 439.382376][T11437] ? do_syscall_64+0x26/0x6a0 [ 439.431626][T11437] ? lockdep_hardirqs_on+0x418/0x5d0 [ 439.436916][T11437] ? trace_hardirqs_on+0x67/0x240 [ 439.441944][T11437] do_syscall_64+0xfd/0x6a0 [ 439.446450][T11437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.452346][T11437] RIP: 0033:0x4597c9 [ 439.456240][T11437] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.476210][T11437] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 439.484629][T11437] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004597c9 08:45:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x1000000, 0x0) 08:45:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 439.492606][T11437] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be6cc [ 439.500605][T11437] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 439.508574][T11437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e5afea6d4 [ 439.516542][T11437] R13: 00000000004c888d R14: 00000000004df4a0 R15: 0000000000000003 08:45:24 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 439.606355][T11434] XFS (loop0): Invalid superblock magic number 08:45:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00z\x00', 0x43732e5398416f17}) [ 439.645420][T11451] UBIFS error (pid: 11451): cannot open "./file0", error -22 08:45:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x2000000, 0x0) [ 439.815572][T11558] FAULT_INJECTION: forcing a failure. [ 439.815572][T11558] name failslab, interval 1, probability 0, space 0, times 0 [ 439.889197][T11558] CPU: 0 PID: 11558 Comm: syz-executor.1 Not tainted 5.2.0-rc7-next-20190701 #26 [ 439.898351][T11558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.908436][T11558] Call Trace: [ 439.911749][T11558] dump_stack+0x172/0x1f0 [ 439.914504][T11564] UBIFS error (pid: 11564): cannot open "./file0", error -22 [ 439.916101][T11558] should_fail.cold+0xa/0x15 [ 439.928066][T11558] ? fault_create_debugfs_attr+0x180/0x180 [ 439.934006][T11558] ? ___might_sleep+0x163/0x280 [ 439.938870][T11558] __should_failslab+0x121/0x190 [ 439.943812][T11558] should_failslab+0x9/0x14 [ 439.948311][T11558] kmem_cache_alloc+0x2aa/0x710 [ 439.953161][T11558] ? rwlock_bug.part.0+0x90/0x90 [ 439.958102][T11558] ? lock_downgrade+0x920/0x920 [ 439.962958][T11558] __alloc_file+0x27/0x300 [ 439.967373][T11558] alloc_empty_file+0x72/0x170 [ 439.972140][T11558] alloc_file+0x5e/0x4d0 [ 439.976415][T11558] alloc_file_pseudo+0x189/0x280 [ 439.981357][T11558] ? alloc_file+0x4d0/0x4d0 [ 439.985862][T11558] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 439.992109][T11558] __shmem_file_setup.part.0+0x108/0x2b0 [ 439.997745][T11558] shmem_file_setup+0x66/0x90 [ 440.002423][T11558] __x64_sys_memfd_create+0x2a2/0x470 [ 440.007791][T11558] ? memfd_fcntl+0x18c0/0x18c0 [ 440.012556][T11558] ? do_syscall_64+0x26/0x6a0 [ 440.017236][T11558] ? lockdep_hardirqs_on+0x418/0x5d0 [ 440.022530][T11558] ? trace_hardirqs_on+0x67/0x240 [ 440.027560][T11558] do_syscall_64+0xfd/0x6a0 [ 440.032069][T11558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.037959][T11558] RIP: 0033:0x4597c9 [ 440.041858][T11558] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.061575][T11558] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 440.069987][T11558] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004597c9 [ 440.077953][T11558] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be6cc [ 440.085937][T11558] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 440.093906][T11558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e5afea6d4 [ 440.101879][T11558] R13: 00000000004c888d R14: 00000000004df4a0 R15: 0000000000000003 08:45:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 08:45:25 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 08:45:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x3000000, 0x0) 08:45:25 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:25 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x80\x87\x00', 0x43732e5398416f17}) 08:45:25 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8000000003e6, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 440.377301][T11681] FAULT_INJECTION: forcing a failure. [ 440.377301][T11681] name failslab, interval 1, probability 0, space 0, times 0 08:45:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4000000, 0x0) [ 440.472727][T11681] CPU: 1 PID: 11681 Comm: syz-executor.1 Not tainted 5.2.0-rc7-next-20190701 #26 [ 440.481898][T11681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.481906][T11681] Call Trace: [ 440.481933][T11681] dump_stack+0x172/0x1f0 [ 440.481959][T11681] should_fail.cold+0xa/0x15 [ 440.481982][T11681] ? fault_create_debugfs_attr+0x180/0x180 [ 440.482007][T11681] ? ___might_sleep+0x163/0x280 [ 440.482030][T11681] __should_failslab+0x121/0x190 [ 440.482050][T11681] should_failslab+0x9/0x14 [ 440.482064][T11681] kmem_cache_alloc+0x2aa/0x710 [ 440.482084][T11681] ? rcu_read_lock_sched_held+0x110/0x130 [ 440.482099][T11681] ? kmem_cache_alloc+0x361/0x710 [ 440.482120][T11681] security_file_alloc+0x39/0x170 [ 440.482145][T11681] __alloc_file+0xac/0x300 [ 440.549434][T11681] alloc_empty_file+0x72/0x170 [ 440.554208][T11681] alloc_file+0x5e/0x4d0 [ 440.558457][T11681] alloc_file_pseudo+0x189/0x280 [ 440.563411][T11681] ? alloc_file+0x4d0/0x4d0 [ 440.567938][T11681] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 440.574211][T11681] __shmem_file_setup.part.0+0x108/0x2b0 [ 440.579861][T11681] shmem_file_setup+0x66/0x90 [ 440.584553][T11681] __x64_sys_memfd_create+0x2a2/0x470 [ 440.589943][T11681] ? memfd_fcntl+0x18c0/0x18c0 [ 440.594719][T11681] ? do_syscall_64+0x26/0x6a0 [ 440.599412][T11681] ? lockdep_hardirqs_on+0x418/0x5d0 [ 440.604710][T11681] ? trace_hardirqs_on+0x67/0x240 [ 440.609843][T11681] do_syscall_64+0xfd/0x6a0 [ 440.614365][T11681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.620269][T11681] RIP: 0033:0x4597c9 [ 440.624177][T11681] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.643788][T11681] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 440.652220][T11681] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004597c9 [ 440.660285][T11681] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be6cc 08:45:25 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 440.668263][T11681] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 440.676332][T11681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e5afea6d4 [ 440.684314][T11681] R13: 00000000004c888d R14: 00000000004df4a0 R15: 0000000000000003 08:45:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xdd\x00', 0x43732e5398416f17}) [ 440.738308][T11683] XFS (loop0): Invalid superblock magic number [ 440.753327][T11697] UBIFS error (pid: 11697): cannot open "./file0", error -22 08:45:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x5000000, 0x0) 08:45:26 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 441.021073][T11808] UBIFS error (pid: 11808): cannot open "./file0", error -22 [ 441.038673][T11812] FAULT_INJECTION: forcing a failure. [ 441.038673][T11812] name failslab, interval 1, probability 0, space 0, times 0 [ 441.079109][T11812] CPU: 1 PID: 11812 Comm: syz-executor.1 Not tainted 5.2.0-rc7-next-20190701 #26 [ 441.088279][T11812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.098346][T11812] Call Trace: [ 441.101659][T11812] dump_stack+0x172/0x1f0 [ 441.106096][T11812] should_fail.cold+0xa/0x15 [ 441.110706][T11812] ? fault_create_debugfs_attr+0x180/0x180 [ 441.116581][T11812] ? ___might_sleep+0x163/0x280 [ 441.121454][T11812] __should_failslab+0x121/0x190 [ 441.126444][T11812] should_failslab+0x9/0x14 [ 441.130955][T11812] __kmalloc+0x2e0/0x770 [ 441.135212][T11812] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 441.140951][T11812] ? rcu_read_lock_sched_held+0x110/0x130 [ 441.146680][T11812] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 441.152414][T11812] tomoyo_realpath_from_path+0xcd/0x7a0 [ 441.157969][T11812] ? tomoyo_path_perm+0x1cb/0x430 [ 441.163013][T11812] tomoyo_path_perm+0x230/0x430 [ 441.163028][T11812] ? tomoyo_path_perm+0x1cb/0x430 [ 441.163048][T11812] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 441.172930][T11812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.172976][T11812] tomoyo_path_truncate+0x1d/0x30 [ 441.172991][T11812] security_path_truncate+0xf2/0x150 [ 441.173011][T11812] do_sys_ftruncate+0x3d9/0x550 [ 441.173033][T11812] __x64_sys_ftruncate+0x59/0x80 [ 441.173051][T11812] do_syscall_64+0xfd/0x6a0 [ 441.173071][T11812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.173083][T11812] RIP: 0033:0x459797 [ 441.173102][T11812] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.239462][T11812] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 441.247888][T11812] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459797 [ 441.255843][T11812] RDX: 0000000020000128 RSI: 0000000008100000 RDI: 0000000000000004 [ 441.263813][T11812] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 441.271779][T11812] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 441.279738][T11812] R13: 00000000004c888d R14: 00000000004df4a0 R15: 0000000000000003 [ 441.293548][T11812] ERROR: Out of memory at tomoyo_realpath_from_path. 08:45:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 08:45:26 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000240)="0c0fd61e14d9a3bf534803b5f19b2b8357c0fa83350cf1f2eb876d9f053964dedb14021a20c446aa4972c58e1e13c584f7431064bbabe864eddc41f26016c766b4a161b7e93e74c534311db38de418035c3ec33a539d4e93170d63c027a58eaf90dd4ceff1c3896346c65ca61f569a3fdd3bb395ce839e6a5e16d7842680dd8c023960b68a67e39b38e0bcd036664c8eca1afbb84b58394e2ef3c728ee4f9eed64a4438d2d2ae2f068128b5c86edf5a6969d97c64f39e0c43793efaa942f92ee") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:26 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6000000, 0x0) 08:45:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xde\x00', 0x43732e5398416f17}) [ 441.472468][T11825] UBIFS error (pid: 11825): cannot open "./file0", error -22 [ 441.486770][T11812] XFS (loop1): Mounting V4 Filesystem 08:45:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7000000, 0x0) [ 441.522228][T11812] XFS (loop1): empty log check failed [ 441.530537][T11812] XFS (loop1): log mount/recovery failed: error -5 [ 441.589866][T11812] XFS (loop1): log mount failed 08:45:26 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000000c0)={0x0, {0x5, 0x1a}}) 08:45:26 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 441.700427][T11942] UBIFS error (pid: 11942): cannot open "./file0", error -22 [ 441.751742][T11938] XFS (loop0): Invalid superblock magic number 08:45:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x8000000, 0x0) 08:45:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xdf\x00', 0x43732e5398416f17}) 08:45:27 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = syz_open_dev$vcsn(&(0x7f0000000880)='/dev/vcs#\x00', 0x6, 0x1fffe) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000180)={'hwsim0\x00', {0x2, 0x4e20, @loopback}}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) 08:45:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 442.032173][T12060] UBIFS error (pid: 12060): cannot open "./file0", error -22 08:45:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0) 08:45:27 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x10000000, 0x0) 08:45:27 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f00000000c0)=0x6e, 0x800) accept$unix(r0, &(0x7f00000002c0), &(0x7f0000000180)=0x6e) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000380)={0x0, @reserved}) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 442.272257][T12124] XFS (loop1): Mounting V4 Filesystem [ 442.300636][T12179] UBIFS error (pid: 12179): cannot open "./file0", error -22 08:45:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x20000000, 0x0) [ 442.330583][T12124] XFS (loop1): empty log check failed [ 442.371716][T12124] XFS (loop1): log mount/recovery failed: error -5 08:45:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe0\x00', 0x43732e5398416f17}) [ 442.419113][T12124] XFS (loop1): log mount failed 08:45:27 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 442.504561][T12184] XFS (loop0): Invalid superblock magic number 08:45:27 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='securityvboxnet1cgroup]\x00', 0x18, 0x2) [ 442.614833][T12297] UBIFS error (pid: 12297): cannot open "./file0", error -22 08:45:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x20100000, 0x0) 08:45:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe1\x00', 0x43732e5398416f17}) 08:45:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:28 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:45:28 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400000, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000240)={0x401, 0x7, [0x2, 0xffff, 0x5, 0x7, 0x4], 0x1}) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x206ae) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000180)=0x1) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f00000002c0)) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 08:45:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x40000000, 0x0) 08:45:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5003e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 443.218100][T12457] UBIFS error (pid: 12457): cannot open "./file0", error -22 08:45:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe2\x00', 0x43732e5398416f17}) 08:45:28 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x40000, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000ac0)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, &(0x7f0000000240)=0x12) getresgid(&(0x7f0000000700), &(0x7f0000000740)=0x0, &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x3ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000340)="016d09f541e874fbb378eb6bd44c42cf34ff664a888b8d0548b3dc316666a111b2a5b3af4695caba0556732c50a9135a56a8c9a13216be185a45cb9d74b93683d4e622026ae70677df636f091d53308d287f43d57ac701e3ec91fae4d4ee9cc0b2610bba1a393a58024e2071294b806c8b5ef27a93923e99", 0x78, 0x1}, {&(0x7f00000003c0)="3657181ab2c39e999b4e1881b2b13bed70215ee17b3da79272fe18c6f7d14f83ee1ef981c6f8d46dc9a744ee0464c5b537a4a5ae95c7e61ee93b7d2c711bfd318472cf3bd1e43cdecddee3a820d4ec8da8eb0574809ec7c9be430aef422cb297e5bf5b7ef57d332f499021a31f3838a0110a73cd3e982aaf2058aca70d0c359faa7eab90b87c081e02cfc750ebf1175c7c191e516a9e1ed9ddd7f5dce718dbc23a5c841dd96b462d54e5c8226af49259338d8b0e01ae18320016ec92fee8117737b0d44049900abcc5a30fa07c6e689522af3e25d117ae11187fafffdc8f1c51c9a7e43db567c7c45c86cfca6cbebdb2f3d57443fc41471166ea", 0xfa, 0x1}, {&(0x7f00000004c0)="4087f96ba2e69c4a845f114632abb9b1c66b1890b95ec4cdac7cad1f53b30512b68633a55c649f4124f158b6df96484e9430a7aad3b446ab1de09b", 0x3b, 0x7ff}, {&(0x7f0000000500)="b3a6c60eab7f026f0690bbfa241e037c98ea54cd16efdf92084212f5d5bed50ca89013a54c97f98a7c5582f29aef377605a170e3ba183fcd97ca8aaa358cab3e86ab7553ba35749fa794770c505aed9ec44dff3c0e187e04890468526681a2ea6ca9b2", 0x63, 0x7}, {&(0x7f0000000580)="96c61702d8978b504022b914dca8061b7f746b9814082dfadac1f9fb37144f007864b39f91b6053378304fcc30594417e1968fb93367b98caac5916a1bd428d1eb86c80d2fc641f4cd0d0f630030d360ce659888248a910b0217bc5e6b86610d8172e309292c8161fff79050fc8500692f8e98e96e8278c0d5a3301c85cb7284402d92fa5cad6d5e488cd31fd62ca57c56fbb09febc2e40d0d49f93e51c4414fab0bb21c62aaf5f1404ce2cb6ad4e801c612133fd1c71b3186a2e597a291cdf5b23354b63913b33a0312be128ecad90043a1ec1cb62f4a726b1827a81ca3924c012f4f", 0xe3, 0x6}], 0x100000, &(0x7f00000009c0)={[{@gid={'gid', 0x3d, r2}}, {@overriderock='overriderockperm'}, {@map_acorn='map=acorn'}, {@iocharset={'iocharset', 0x3d, 'cp936'}}, {@uid={'uid', 0x3d, r3}}, {@map_off='map=off'}, {@map_acorn='map=acorn'}, {@check_strict='check=strict'}, {@check_strict='check=strict'}, {@uid={'uid', 0x3d, r4}}], [{@fowner_eq={'fowner', 0x3d, r5}}, {@fsname={'fsname'}}, {@subj_role={'subj_role', 0x3d, 'xfs\x00'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, '*+cpuset[!wlan0(:[$\xc4'}}]}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x3, 0x0) 08:45:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x48000000, 0x0) [ 443.335881][T12428] XFS (loop0): Invalid superblock magic number 08:45:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 443.537853][T12557] UBIFS error (pid: 12557): cannot open "./file0", error -22 08:45:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4c000000, 0x0) [ 443.590937][T12557] UBIFS error (pid: 12557): cannot open "./file0", error -22 08:45:28 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstatfs(r0, &(0x7f0000000240)=""/77) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:45:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe3\x00', 0x43732e5398416f17}) 08:45:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x68000000, 0x0) [ 443.901916][T12681] UBIFS error (pid: 12681): cannot open "./file0", error -22 08:45:29 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x5}, 0x2) [ 444.161312][T12742] XFS (loop0): Invalid superblock magic number 08:45:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6c000000, 0x0) 08:45:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:29 executing program 4: chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000400)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x5, &(0x7f0000000040)=[{&(0x7f0000000480)="7c72ec4d9103c7b3d9d41042a1fff405afb7cc7d8605133a64ab54103cf8d1d8da59edaf6f766e378a1183cf2c1b9800257411db4e69be6f0421e7d34b15f44196f1b84240ca325dce5ff4b8bd08b4947e2d380c0d3155f3b558596ed16df6bcd809658f89cc15a9791205af2f4b76ecad484afb83304ea45f2a7a84019b631635c9f4c0e04f47da436eeab81efe77bc57aa97f1da18c74a87e03a8e1e544779103ec65a39950c9aa83eaee66be77cd9a624f542d156c970901737483662394c419be4d5d69ac61c82d8e8c2498b7ffb8857706253c5fc0627bc18e09aa04736079d02", 0xe3, 0xa3c}, {&(0x7f0000000580)="887ccfbcbe779c81fb9ac99558d42f4cd47d997cc6e42e076216e10713e19bd3b94238472d861dd560fbc8ba7b3dcb8a38cbb2e294e7b0f4a71c7eae99ff074c3c29e7997d22f767152658fbb317cae1fdbbd2aa087b5d09d710a4b40cf41b56fbdbdca36001f616fc0052918c8815afaf3f6622f144241080b2474c309ea018914a760f488c3190fde21468a7918ffc093171ded22350d76046ba47efc76c146b13d9aafbaf8f3cedd36e2dc659e48ef212e961a00be86247be96743ec47bb100cf7ea0d0031fe5891e3728e06174e9124c64cc05f4", 0xd6, 0x1}, {&(0x7f0000000680)="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", 0x1000, 0x2}, {&(0x7f0000000000)="101c61609698e627b776", 0xa, 0x4}, {&(0x7f0000001680)="3abd29d6a8202332ab09ceada9f3940590546d66580599a944e4503aa0fd0e0438dce12aa9773b9d382f09f816b3b57290e9257710fe9d8527d8dd22792a8d4b5f8887498a974bb023eebaf3ff7d6acfdcb7b05b8b1db27cf8d81f61d8dcd2c131d89563f44567243a68856f916a4717960184b51d1a131139338e140e5554624798f73b7dfdde899c452db850e34b862ab80d64dce89279ed12a029c2b10d1ad49fb5f6b5733d413f52003d7549c0d93ed06b63ff66b543fc33260edb56371fe9f8489ecceb2a6cf024dbc85dd2945d097f1764b035f7294661c775e4e82e2167c98343db27c6205b972f3a293b2f77e9ec263951958c65fe08ccc60f8f0181efbc2e6ec4f679957bd4da72a54d0685482807b9942d85cd8e8c425c0b9900de8fde106c0af55e640509b490086172c100b8dae62955de4ebfa9b3dfd02b237cc4435e6a6fce75b2872e88564c4d627c26da0fe88cc2d8534200a242506a58bd04c62ccc5c01660a4f24ebb2b6d877d63308b80c312fa840dff898f4dedbb82eaf528933c6f355afb03c4de6cdc6eddfed43eec31903729ca338159ad14043f1dbb1be1b63cd97b1d5f829d6cbaee3d6c647444b6d1d5bb632b7e24302386a9cc0c78a9cb0b540d4be3cf28079d39466646b3a645bddcce49bcf1a4a291adfd515e1c6185775c5de339c5b2534d3b3a1fbdeb257849efee4548dcb2fd8c3ac857b7fd51572ff830ddbd6ccea735381653928bd3a10d71374f8af7699b74c27dddbcfb888d67b00408c06b7d67cf5b95036b004040b88b5a12ef522914ed23aefb6e8d36a92614c74f7aa366c4fdb3b40de24daf6509685eb1992167f89afc99c394fb1b808b0f4835c11ae4b36e470e811722c84d1f6aaaaefa05f8cafc5ddb0b2143361846ccce06fe8f1afa8944d4917d4ca993263787d878e5fc7105a114c67758c795a64b3958a5e2b14173b0f1fa98b0c4a39164a8f8af55902b29e6f15af5bab3990d441961fb72774ad4950009e447ca7b7c4c779074c5001d6ce35dbff5ca6b8623967692ac8876a2e75a1098d2345a200e9efb3f0d3c61dd741ee8840b1d568cac1df3e3654cb4178989dea55e6e3d47c28427f4001e5a740ab736b5d81c68a253b440498d377d46c4ba9315cf33369bdcda547a2547b9bbfab172019baf3e02bd1a811395e304bcc7d4a23dcdc2224ff1fc74a7dc37045fc515d2bfc0c939eedca2b01c0f405bbcd903512c5410945e58e7d830f9f6eb9e537c3ffc722de367a305ab0b3a43067ed2287de688dfa5cb663bb8c8923c8c1dacc11118c763e3968a71500ab10e4ab1473d73827765d193b33b7f6962da07c7f70f914e5d558694b9f2199b476a810db2a74a21e6768dc683815208eb7ac054f667700532778429b0d7377b655321ec8c3ad231fed1fbfbbd4d50aa1406258ab71667cba4c3fa970989bc5ac1aa991ccba18b4cf85fc4285267711f51997ce7ae2355db2e0839389bcfc00bb33825f7ad411d8d698e62167f21fdfd3b21ea1ee4b20bf12220c8bde83abd8e4fd79b06f724c12ffcc11777e29b5fd9e048d080f7803c5a3b1f29524822ca22149aee4997db69653b947a375003e23b1368dbc07f46d10e27dc9dfc1e6cf0a89c775eaaf9e87f9afcc26e9be30d289a6d6357e3a27123dc73bf78cbe03d7b336c08f179d160cef36676d8fd0ed922f92c1906e5bde0f1088d82e66ca2fb613084579d660ef580a87125a295ff649103a130257d6b8da27b651c9ec49351884098067549a9daf8fd51dc1aaa6148afb06161c4378da101599ac677a246f6a6068cd557a94bb910f08c69678c0bb2726bb061c5b303ccfc70f7bbe8c17c6bc97c81c8d4517cae3d4a22e883b585136044d0c34582eb0b010347d50485bce5b4aa85b1d4c168f54aee258c50d75ce369cacaa1a50f15dfb8dc4d534dc395e67ec516a4606a1ac6359ac86856ebd67016ca407f0ee8f0de8131819446cdeb905d6f7280afa08b125c90416e787ac672d715e05623495c6bfa1b3a3ac51bb67410ce8d62102fc844bee19e960f6ab854d5477a7068b68fa4109fcc9055a59fbef5223977d5dfe90f1d552911e14f547b2c6b376ff5e0d23ef202d6548d45abaa6fdb56a7bef7a5e9743b4b1ad7f4f05c1a2a7d1424221abaf3c0614562951bb14360beac131b64f12388bf6c6a3addb65018e0949d5ea8dd077e56030e218e155db9c6317f786a5deed2e775726c52ce74b4e7422ddab8fcb36fc1b702348cbc8ec5a802afc1cdbd3d0fe533d0c1d31d9fd8b0ab4c9be7d0c0ffb210135a51193e3b6553be70b0911ca12c017ba03b16f5d05e938c0e9d70a15392f1a0f2aba68bda026666bc3a0e5bfacfe3bab5efe99d98915caf946297037ec11a1c50a5840126ed8b5d2a7e2d9bf6dc51b2a7b7164e01176de317aff4aee9f0c7f8579d8286f9e258ca0091f9095c3436d7b5b971fa089b15484516ca1d3521b71e0fac4523c8d2860aefd941d9eed534f07052d434cd3eae8b5178c9b5e7fac3e6c8227b9f86237e9df582d9be5a473a32617e4eba7f89c591d10c6609a11ba5d90d263ef6d4607dfaac5429857893f8a8fd862f28fef9fbaedb061cc953ef764a15cddb0f0cbb6c9bc7a5b1fa053bdc51637d3c7cf0276c4a3d72df16c7c65ce617b889241cae18448844f8c15d6919ac2f1cd384ee9d3b16c23dbd12146d14d2f80c0483879932f508bccabad43c16a726061bfb6cad57e941b73b11a3cfd47977aba494134a662e1899ad8538fb11e179441f5ecbc8929a72fa26f9d94a2a25488e35db64a577c80dede58f675257a3dec7b45cc768e131badf232a8af07b04c35606e17c994ac5c367735a6e939a21e482836b141f05df675bd35d14299a50b6f46392c23f5ece43a637ab548dfa2eaf1d07c309f68c351d99a3797afaacdfd2206370f3e75f958ae019bb32c2fcf53d8852aa2e34565edcdb463c5bdd214e5497f60a7f96a8f344c47a48147ec77b4a61d8058c20df8ea67299825b5aae717d24c09d3b9c4a87af3e9657d6343087b3de18a204a14b66ed654c772760674b2a346a9d5b100ca371101c900999df8125b680b97ad9c71dbdf5602a7c9b4e5b33e294d1936f5d19b70ef44af6e790964c853b7d44ce86f205e96aad37591e7c4292724ab42f77034b0416d815eac5ca505f84063a083176657e9f391268f34a5f75439e5f3dcfad7bb93b1dfa7eab30f4bcf39f72c938df285a7ae21b78bffad76893aa489f7c204d84e7da3965dc4207cd4274aa2022667e485521ac2c7641cc21a3f1a562c09cc706a30fbdb1d26289542a7c1c093fa4bc44fd5eece9d10c9182ac2b8cb44f46382ea5250180dd91a128dcc3392e120a6c1e7a6242d8558fadb6015e28fabec5118030e3d9858d1fefcbdf3026f13e2b94154837637c1d3dbdf2c4ed0272abe7bb16fab50b100954c1596d598746cee7a99de9707f7fe3f54f00c59d74d7658eb36fff756658eca1c8605f85090fa99a9c8615cc0153cda85ed5a9481b5d131f470eaab80651053d89161760d7ef36493108263b353abdbdd654e31baf7cfd3a2320396375391029407b70a03ba7271164b6daeeddcee812dc994106e9e8f74178d5efa3ed3d5a393ef6b76f62eb29ef2a747ec124639b24d04da8a72a21f8205453c7bc73f3c05519707e7b5a96a47b6bea312df028c695b89035970556def30c2faf6bf2871bb59f24edb03a8283a6920b7bc95eabe1849614cb9ef297ec65b0a3c9dee03d06f4acb5890b54b52fdc6eb4f9abee76656f40533cd3277686c90bbdc07afa60715ac610acf32168d178c3015346922c6e6decc753dce0303a13ac23e5fdff46fb2e67170641be54561c014cf24ac014ca69d698fd9b21539758c922ddec0041eb81766777adf966c400848375c2186d9c3f71e3a36280d492b7595d982fc514bbd374671e5de5668aab3f935aa5feb384440be54d041f98c0de2068f1c1c67e5534a8081695d570eb0d2ad373170d0ba99ccbb1317b8ee9ee74f3315c94abea3deb746443d2bf5b985d9ee39cea25774e2fca6d0ecda92a341034a6f82bac9b69cb42ac2fb8604e35f75d7711cad4b271f32e22cf365fb6b2d12b79d5b53f2aedf951d88975cf150e6aae15c575fb668ec31640a73e6e1541f6d301b4b76db0d8eeb36acf58ec671b431e090cbd64db6d02dd623c29a760af1997683654d76fce0f96c98a9d0b024aa632268628d644c6a8e468752f4c7d29679c4230cbd05d34ba25b5d9248c6f8f2b7e116a41682d7fa9744b448a20a54e8f277f4880e221b26d88ef3d3ab95fbc4c5532de07afa909fae439f493355af53e1b2f08c10eeb655ca46b6a5613c9235d64362503159416b41a415031f2e880220bd58b7968024932b2d322196ac5231f7d196c81cf69a81440677ff35fac85cb8dc847022335909e9b4b1d4a74c04b98c70f85d5ea94be365483b31991578faecd3d2b0ef83eebb0e9d58232117995dd559a4b0a18ca4fce36fa7fa397b74552be75d23969cbbba83394bc01d51280bde1143fa4e02446917ef8f1d4afbb5a2762cd650f3480810c37bb2276bc3b073115133184f0b8f4542452588d24e767fb49fbf57665ed49735e7d63c9e47c49882c95ee1f3235bc750d6289009b13288ad93e8c64a1d97845ba114e65f3022e01807ac5eabd508faf24dcbc1d6ae36368603b30cd5e9ad76111ea7bb2e78b77068b1d79c8e5d9553be5a1f68bb9ab21ec703222354501159d1b81ff5998b6e914b581a7a3d70431bb166645a2fdfd8c8c7d053931968b4d1c7b6eb56559da57c55ee87e45c5a779ac73e85f2cd3359e6bf1b8c15c444fd9564e7b29888a8c54ba724054380aa1dbb7722b51111bffee891ea22ee6f456b5c4228add3eff3014d4365b5ff7b0b7fb86054252553c0922c564d94fdc4049ef994daea15212e5a2b7ae748849b1a673af2f06f1722d6f1c22bafad860afeea2462cadd817a2235206010f61e0dce4a06fb3f5abd1ef36632c99e14d5bd01b247fdfdcbb6567b6563683e5fbf1301eec45a7f64af5d6a21bc579b6df9d4a7b601668bf69c71fb599a58ef65417121533bbd98719b83000f31348bbe94a161a837ae1bec682eb38c69ffdda839a62c4aa99e8601c2ffed73600940e1289c59961ca9a5390fef2aa39d1bf4b1cd8eaa07621566ff1eab05f0872e457a98d313b042e07de4e62f5f68302a226bbe6e06b03e3a79ead1c711abe60800db9cc3a43d48e9a9434bbd64f1f6ba27b23fe509c6af62b927e2cdb84fb92ac8d6d832d514696c1128cd72577a1f9c4eabf3a610e70442cf0b842b9a2847ff4c9837078ad676d84b13902fbc34c61ccf5f4f12afface940ac516fdee786008bd348dbbc989ce3f4700770f47ff44440c9962d8026ac9368d1a16b10b1edb8f3f8e52071b11b2400da6cf720dde330e8ab3bd0563edf8478c14c8eae87b0e391747cb9f45b9892294d50fe3479992fa936db1b7fc28f90ed7abf619613c3afde8a3f2573db0a64ab26d61f322ce8c68b59e8cfea5538969756710be26612aa0cf0186b73b211980bd222e976276593805e108f568666e9c00e6a080e17d30344d46c00f7f5f81f75a6e835d36a2f63f237a190c07c0eeae4d04722b962cb8c60dbbcca79adb8d664e0f7d807334a5a7b2ad3232aa6fdba7f104f500cc3e3a3a29636f38a3a64becf468942cf0e5cf6b048f18e224464d988d5c25502ea4c5b13fbece947e0b3cf642ddb409fe3cbbc6bebdb098", 0x1000, 0x4}], 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e20, 0xacf6, @rand_addr="45590cfef73b9e54e9832acbde6b5162", 0x7}}}, &(0x7f0000000380)=0x84) 08:45:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe4\x00', 0x43732e5398416f17}) 08:45:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 444.539596][T12915] UBIFS error (pid: 12915): cannot open "./file0", error -22 08:45:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x74000000, 0x0) 08:45:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:30 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0xffffffffffffffd3, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 444.763577][T13032] UBIFS error (pid: 13032): cannot open "./file0", error -22 08:45:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7a000000, 0x0) 08:45:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xff\xff\xff\xe4\x00', 0x43732e5398416f17}) [ 444.948197][T13033] XFS (loop0): Invalid superblock magic number 08:45:30 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:30 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x1, 0x101) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000002c0)) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 445.152187][T13155] UBIFS error (pid: 13155): cannot open "./file0", error -22 08:45:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x8cffffff, 0x0) 08:45:30 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:45:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe5\x00', 0x43732e5398416f17}) 08:45:30 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2001, 0x0) recvfrom$unix(r0, &(0x7f0000000240)=""/244, 0xf4, 0x2060, 0x0, 0x0) 08:45:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xc0ed0000, 0x0) 08:45:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 445.831161][T13283] XFS (loop0): Invalid superblock magic number [ 445.849454][T13389] UBIFS error (pid: 13389): cannot open "./file0", error -22 08:45:31 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) r1 = getpid() fcntl$setown(r0, 0x8, r1) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3, 0x20000) 08:45:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf6ffffff, 0x0) 08:45:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe6\x00', 0x43732e5398416f17}) 08:45:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf9fdffff, 0x0) 08:45:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:31 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000000c0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:45:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xff000000, 0x0) 08:45:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe7\x00', 0x43732e5398416f17}) 08:45:31 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@bcast, @default, 0x0, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 446.756671][T13637] XFS (loop0): Invalid superblock magic number 08:45:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xfffff000, 0x0) 08:45:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:32 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000240)="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", 0x105}], 0x0, 0x0) 08:45:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x03\xe8\x00', 0x43732e5398416f17}) 08:45:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xfffffdf9, 0x0) 08:45:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 08:45:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:32 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x7, 0x40000) prctl$PR_SET_PDEATHSIG(0x1, 0xb) renameat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00') 08:45:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xffffff8c, 0x0) 08:45:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe8\x00', 0x43732e5398416f17}) 08:45:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 447.560969][T13895] XFS (loop0): Invalid superblock magic number 08:45:33 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0xfffffebb, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xfffffff6, 0x0) 08:45:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:33 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000240)={0x2, &(0x7f0000000180)=[{}, {}]}) 08:45:33 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 08:45:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xe9\x00', 0x43732e5398416f17}) 08:45:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xedc000000000, 0x0) 08:45:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:33 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x8800000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000040)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x98) shutdown(r1, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x6800, 0x6]}, 0x7}, 0x1c) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x4, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0x7}]}) 08:45:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf0ffffffffffff, 0x0) [ 448.479277][T14174] XFS (loop0): Invalid superblock magic number 08:45:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xea\x00', 0x43732e5398416f17}) 08:45:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5004f00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x100000000000000, 0x0) 08:45:34 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @initdev}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 08:45:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\xfd\xeb\x00', 0x43732e5398416f17}) 08:45:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x200000000000000, 0x0) 08:45:34 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000240)=@l2, &(0x7f00000000c0)=0x80) accept4$inet(r0, 0x0, &(0x7f0000000180), 0x80800) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 449.285170][T14497] XFS (loop0): Invalid superblock magic number 08:45:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x300000000000000, 0x0) 08:45:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:34 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xefffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:45:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xff\xff\xfd\xfd\x00', 0x43732e5398416f17}) 08:45:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 08:45:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x400000000000000, 0x0) 08:45:35 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 450.043661][T14748] XFS (loop0): Invalid superblock magic number 08:45:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x500000000000000, 0x0) 08:45:35 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x10011, r0, 0x0) 08:45:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xff\xff\xff\xfe\x00', 0x43732e5398416f17}) 08:45:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x600000000000000, 0x0) 08:45:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8002000000000000", 0x37}], 0x0, 0x0) 08:45:35 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0xb1c4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff48, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x100, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0x0, 0x4000000000, @perf_config_ext={0x7, 0x9}, 0x10802}, 0x0, 0x0, r0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x700000000000000, 0x0) [ 450.953367][T14997] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) sendmmsg(r0, &(0x7f0000004e00)=[{{&(0x7f0000000240)=@un=@file={0x0, './file0/file0\x00'}, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)="7b3d73e65f0456595034911b00", 0xd}, {&(0x7f00000002c0)="70b2e70704627ccef84e6134799ddcfc99e8f8d68f559012270b26b70714269a3411e9aa79ee3f6d9d78b945825c901ac753bc3cc81b70c0f1a1e717ce6d5c186167c32104ac52c66917ee958b5ad68876addad9083296ea027143a98be540e201d154cf287439ae12943cca12aea9b65adb19bbef50ee84e72c68330a51fc55dce3a71e997c0dc89dfef60aea", 0x8d}, {&(0x7f0000000180)="5762da78419eb853f38d2edf16e04c6db6aea39dc2fe12", 0x17}, {&(0x7f0000000380)="11496836d8", 0x5}, {&(0x7f00000003c0)="182cf95611329497", 0x8}, {&(0x7f0000000400)="77abbb57688924b0207aa884aa99771ccc92f63671cf7b9fe264a3f06b29034c9d223ad5b32ee2808a1b6f086957f4b1cebff8", 0x33}, {&(0x7f0000000440)="7fadc39d9820ce14e4dddd60b782f03062e2f18212052bc41445a040bf2582518980f716db0734946bed98e4ab549e3e25769d31827b443929665f35bd145ceba2d395c7dcc5eaac058aab7bbec2f86fda64d2b564fd87c71fbf829a04dafcb66782761c651c20", 0x67}, {&(0x7f00000004c0)="ed9f008f2e1976de1f90adaf7e76c910b750de8a7f2d0f93e101c2284b863d06486e4ec4c49e3ce89775119727528ca371d7d16426c5a78219bcfcba71022ae6a2e2954178097875b919275baf50da91ba8f75700543812784da2651738677", 0x5f}], 0x8, &(0x7f00000005c0)=[{0x1010, 0x117, 0xff, "ca277de218ba3bd9a499c37f8374966c5c1b75f63e2919a5b645be5ecdb2883f1d5186a59e88c8db6bc66af2273cfff49c021a6119dd3054b6a323dc9087b8bd7a87ea68934b2342c00d79dea7cb9197bbcf2d8068626e4b5967e1e75febdf322e0e3dc8119b2840f406a659a7c40c19ed255b95203ef414d7397f4f1eeb0c4da506b9f7fc35dfcfdfbb2b05988fa3c783530f0ab7c203bac9fe4514b47d54a5a93bea39e88804a9cb6f31b7b9d5367ede365184f0742aa6fed34f9e3be290099a976335a280006757595767b37e3e20faff8939392748c953d4e02613a9078d84bc2b59421c5212ab0ca31c999e58dbc0d29d9147c4d56cf56132edba8d3e9825537038c05c3d4ab99652af10f26b6d60c67c59c5c0d9d555b262607d797f813a1632cc5818a25b436e99b2ecfc919f2069be3c5342258ad97d5d89f83885682a740a0a6a310a2aaac7d6b874ab54eb34264242d11c70d4623ab5fe884043ad644ec564f138de0e2dbe0bd25389ef2bd05148127b407ea9ca1075aec2ffb9bde8ac1e5ea288bea1d775d2a01e32cfea2b05bd3be72c98c2c061cd30315da4e967c412358d084b84b2dfda4c4948e8413e8ee73ed727ad7b46fdf2adfbf2fe9dde13f466e1db16fe3bc5af1488e8e71bb41655252e125b643a0dbd55ef7a9efea395046435ef8fca406f3afc463fb5667b24bdba875c9330313bba539b0f68689210b1271175d3684df6235b3840cb44e194a134fc5f9925e22ea8e9d7627f0ede3898e07f8b675bee12ae1dd27fa365241cac7444629118155d96f4613cd62359afdf2f4297c44d0eb4a4affd7eb02f2108594d8cc59ab2f873ab60efd7ba1f13b2085bfc0df6156d26b939721ead9fc8d945038e0bde9453eb1dd884dcc80c7c56f6e79b441be96f35029cebc2f355c0030e373cd3dc7545fb516228d6f04a71166e50870a6e59cf3a4074fcc2f460b895447b98fb53a5ec94c73a37287b17507b56f8da0067a281ed579972080cebc239a814a4d6efee37ba15cdff95358d226d0d515b0de23a1f651256e592422252b39fbb2639aa58c98583ee799be55ea2655ea5438c055ea063f27328d18e469fe495a19c3c1bd13c9c955f3ec94965db44ca44b5fdc7f07f3a965c6815837a0e6871d208c854ba2fcf38c2c6d90d28214f76ee9097743c25b8792f93b91897f5f64127f31703b9af41a15e3c3b17d68292411aa9c91053484a22bb535a441be68f0bcd1bd5e24bc8d08636b2f1a0e7b6fba59d1c31672102ec9d0ad4167be8753b934a29c1cef567cdbffbd5702a1dcaca0e786946fd873c1bb3c60d7dc22470b4583f6df8ded1938538c8b43f6f58af7df936b476098164f7671ac327534b68988ed23958a932b2f79c1a982bc5f598e1974b9d6377c6640a5b3300cf7f6192dfa9f47ef4d0a29cec9644b3897ba9e664e82dc471bd5d38a4d1cd3662dd23ec8aa435ccf1084c5c9210ee65276e6c5a934b767cb23a5796ebb11e4726e5fe7b306af857106102fd3d8f85d70614260f13cca6c29892952a69cb7f027c40894cde0afe4a23c7a578df0b153efb22aba7a61e539cc78051b0d39dda9f077ff86a24c63e7a42eff282f134f91ed36923547e708b598331d15e76ed59b65657c404626fea00ad497c7f99e1ff47ab39d598556ad6e1ed0fdda90b7cbc79859f4c2623179a3e03f8f5fae87ca39dc89cd5d6780f554c630e4cf74cbeabe661df3831f4808842920b5d6c81d0ebf68c34d0a15e802a1655421968b59487dc8b8185f8a718d31e79d8bdc2b66c8309f019f177013031ffed4d9fdddc619206a7e9333f2be081281817a9f2ffde09f5b17a2d9f43837e3634948939b32b83f6711231a502a8f04c6ba17212acb9b0b47db3076b8982c606394b816710937417192866d9afcef2df6cf05c1bae58451ae7dae3efaa844d8a508267086a5234e6cd41c2903c48ba8fb899bcee4632dba3e96c5a3d34687b3b42336e2c184d9c0fa14e778bc5517953ae3e61a09739b433c47e79137a51008174ea6f35f9c874b95f422fcbda7c5eeee5a7be1e4b6ab8f8915b22de673ec1634e5741401da4d0fde1e48265e2462b2a2eafd61c7e83719d86499634d7929cb9aab40e490a8ba5017275aa0b35a9aaebe54aaae627b069f707a94b4f0720821a1b0115d9767c7a00cc158aa5cf409e29ddbfe12516a415d2760098b1386295f832997ba15919a23149fce2c62e16bcd7e0674781d5cdc4aebb66ab133d4d4553c432067c6ddfb98033de46e7147d00bad6dce86efe5446fe93c30fcbc2dc92649dca2900ed7b8fa8f80bc76d93e0513f939cdffa1959b85b55399b55dbb3c46dca0f30a89f65790189e7e88ba72cc08c9d4431abbc9d24a324c85d8a586c1311e64368cb6c163b30744dcb581d799c24491a624e410e076fdb0bead6ea2d18266f365891bc250abf7789c546a5a6b9035241d9337417c2a466053801d66d9faf5bff0d4d0ad839c7f54b4df8a4c2924a022633a72b0ad3503b470eff760c8a98fac2f3b663e42aee9754cf6f66a15e851311fbfd551919429ca2ec02b5258c01382ab62de4c28b77b1af328d32c0a427038f06fd7145102f65199e4146582c111af9cffd155daa5030415f532b106cbf2b81f5bce9f1e9a99a24554717457dee0876b9c5cf915beee8c7023aac4405ab7c46bd28dff671412225aa0af0121786d31dd692269c4f2a6e87de9efecbff2f0f3c22dc615019f6b49052710d6d33f9d81eac423e30b53ecc8aa20c594a4c8002425e1723b131220b573c76dd6b04eca6b123cda175f5d4b19d9c271ea5bdd0c02c249ec397c9f32cd2c6faaf21e2fb37c16df281112663f2de90fd524fc14dedbd9fa586be0cfd466e5ec84aa4440635715b2c709fc333936b12e87bd4fa703fb9e03e201bddbb4ab93337ad2805acdd555118a12617fb261f08ce48e04fbbb10e4635b1555f12c147e30a1fcf794edc12d91089164782a40f24d4eaf144115bc4e0f7ae7e54b1f97b906773ad2b87c0405a6b3963f1b5be24ca2587b56f5bade99bcf6ae563d1ee81783b9d413c3844f7e816428127ba3e05ecd920ace9f8ed1b9eab60ea4b0b911a9a1bec431ec36215b990bb1ad04cd4fb7767ef0e2809d5c08daa97852f4801dc5665e9ecafe94a2b434b92b25a292dd2c5d0562eaa978985ac3c265ad04a0e4cf378dae31287e0f0d4c4033c9952da155e6e276fae7f3f696c2a90a6b54b2c4f68e86a6661a79156880bbcc1ef804b11c77b41e6c88e2198c09d3b770e9f3e7e42fd1594fb69a7984a9d642adb544510ffd8de662c58eeb788c62f63ca7e005e20de3ce88fabbabf5b500eeb1d555d0e4087cdb1197c7510b9041b5c6783cab20e9ae175893fd34f7a43dcd86dec05c9eaf709d1333f99bb3db08553a58d58aa267f4a13b7a78564178091f55d1580210eaafc416840c84af5595c52b08dd3dd4633314dbe03f2bd18b3080a3b7b4cf16dc62c58034a4557d2a281a5c36a712a428fad6cfd317f8f855c3cf273170f041702a9ee972c300853224204f37d4fd8ddb6e26eb57eb45f18d2d976843fd2ecebf143da1222c403cd35141d324ee22d866bdc5a69869eebabab5b46e482d5ce5cc233b6e663eaef6dabbdede3fad88787a4e645d26f4044666212304cbf3ddba561a2d264bb96cb360e342d1e08270c0aaff9c061631a5ca909d856c7bc5c915c732dfd357d685a64e20f1ae963c3bcd78a2c11b84feed13d29a3de8ffbeedd9a8a6fdbe5c9f8b48e9b5fb994b8a6380198200e7e1194ead4dfd69d4eccac60796f5f9acf69b6cb9ac8d5f1081e5d642b2d7976904552a15b7e70a3d5559cf8b13024755f1ac8d2b5c7325dbb35f6dd58e07458e0c38a9fc20b05725a828e3b50c9451dc7aa1a1b5ff0429fc46298883fb443e627db23181e96a46abe31823bb1fe63cc66a299520b78bd248215596d08d735629e74377d938950e46907495a95767a04643f472b9642308a8fe65e2b3346aee3a0318e2d3b005e181711cd9e58ded291dd5bf5ec818dbce37b5a0c30538044b55a45ac6a8f3a4ace7ff91d857a321ea840a1cc86863ab08ea1f30cc579c6d98ea5c6d3f06620a3ff9b34758a371971f4a0d9e7af6e78a1b27dce7931dab01e6a458c614351f2c63b0edac8a611dfff4c676dc81db10342a01b4f2bcd3eb558ef468928121ca8b3f246662d9eebf8df93f206550ca676dad826a007aa9292a6adb43369431691a0a04ac1fee1d561b2a897797fc84f485eab00b32db5bb9bddfdc44d0e329cf1e69fb54584a6323bf6ac27ef2518727be955f7920ec96ee34b21cf5860b2051483f8a0cf06c634353038ade3cc0920142e144edb328bea42e37736e4cecd88d234a4a19fea752ddc35450fd139e2507e04519567eaaa543a4d880f91bb0dbe5a0340224d47f722965a57d71e487aa0a4577d1d6227a4f1578c882ede8c7731e180941077c16887ad7dbff28fb6419c230e87f973bcfd2f1e5f4464e01e4e1181a8ed72bba91f927c838226db589851861fe54335e6d3550ba061af81c972278a590a5d77e088406cb28e6dafe48cf42cc29c560a220429180a98e2e1d792354a546ad3157da235026e8b76ade7f7df764a3458f0faff7af57031b92c6453a726e5ac78ad13a6251b36ac667b18a8fa71e2eebe12a9afd4acb186f179918097e21ebfaa948ac0fa9359aa3b982b157a38713f2d97ac5fa7a88e10fc37838f1526878996dd178255305faa2250002dbdca72f9063927292971c35c2133ea5878f5e8c38318a39ca8b706b42aa9e3c6867c7f85567cbb50cf57f9f9cc0f9bdc03f088c18567bdbc1b6c5bf1c7760a23ba626b107b6fa3f5ae35901ef181bdf241fa3c2699c71114db02af3ca059cc9fdbcd6423477eebfca0d632dec8d246e8d29c559ede61bb610574b3e0027c084facd718fbfe693d5a4e1afb585440a04aac982b5ed1cb955a1e9a0daa72ca90450ad7fdd2384d475753536db418d8f039e9a6b1590e20960cdf7941d79e81491657eac600fca47a525b7d0b7c368e8d3551ae642955ebb195a8b43fa48c468637f672ba455fb23f1d53a0400edda5db42a71ad8bc002c7982c05950258a7b00d3d773d2883cc392d21e322e24f830839c1ea369273e8adf5a65201dea4b464b5cd3624ae05592e2127ff4d8d60d8b5ce9da09741f545d42ef85ff90a6dc9819bcf13204d79db7f3a8fffee491d5954392f5ef060caf65e4d0d1e37b9fef2a630e70464cd18d8471654f298abfcd5b678bfadf0d87718e760e93fb2d09fc104de68c2a1a73010606adb892fce2bf8ff43a312d6c2972bfd1c407ccd9ede80b813c6ebb2025d18dc8c4787dde718a9018a1c6b3c46f8de16dd9d4d7d69390717042c0088bf58ff5f3eb177fdaf15967f371a0b0f52478dc2cbbbf0e0b782c1a1b8261134bba3478f0daadb24c228564d9bc824bdc8e5bdc55741fc22cb7bbc59cbab8f24f30acfb2bf378308a0952efcfa8f9bc1f4a35506ab8ee54df959f10d97e0d0192273ae83ab40616a60e64dcc7e33ff221f574df52dca5d99e146e38a1d6214c48a2b701bce99713108cde60272ee278bb9ab4b43a48d85fa906e2d6c3015c68e80d46d78f0e4295409cd3d982dc035909cfea30201a1d55ddb468b121ee077a6564032dde45658df4f91998ed50d615ec9fdabec221191483c358c9b2ae9c9c3ee79815b580fa98eacb6ea5fdc337aae1b9ece3a2a4c628b97ecb5730f46e2bd70bee79de0db0"}], 0x1010}}, {{&(0x7f0000001600)=@ipx={0x4, 0x3, 0x1c50c00000, "62b7a048b9ac", 0x3}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001680)="b8cc65c81a8d711d86cad30e74ba5dbeed15a9e4937f1e14dca234a8c78d76448facff8661694b5e5143080b6cba08298a9b052692c0bd1cefafa2c535f9d015242d462a2c722be813eb7de36846bb3355ea14be55fa3880a8b3fca57de5e77c", 0x60}, {&(0x7f0000001700)="48f1fa0849ce30847c43e8399a08de33fea1b400f85e4787587b0784a1376572e1a5c69027972531f42e5f7f8be31e36563e4e3a5f61cc43a00ef52bea40c49afcf77b9abac1461c6444f633d1923354de83daec8957ce66c21ffea659589c5ba89da3a9ed4c7de686647538daf5d2b36e0a837c6e3e5e49f1cd50", 0x7b}, {&(0x7f0000001780)="33e22bd37cb3499a64877108de10b1afb4bce66df889a8705cf80e8b5bad1e6c629ce8ceb5e21eb35e793e47afa84e6c3a09d3833ab243ab4e8e4c8b522ce84f06b6709757efacf6497c09809d2106b5ffeec08fec5eda53452f1f8a46ac61907e0da6d787e435f91b6a62d44171fc303fafa83e782d606003c62b96b46940972ea6960a3189945cfd271c67a99da2425604333b402ab545fa23fcadcef18b89d8862dbbc1ff3648c8ff75ac5b9c24b210e380e337eecb0fd2da380bd56ee368aa0276485f44ae3eb4a9e879ad0a9a23e19bbc48401e51bb7d", 0xd9}, {&(0x7f0000001880)="55821231b96137573f75a03e91163f22c804892f1b9db81086b0efc4dc8c281ba4120bb478afb7c81452679f5e786647ab055038fb21e9a538e0b67679aaedfffcd82a4a9c0493fb5a976467337d12230f1e06e81f1139840c9c7a3368df74d6327a17f46afe407e64f49e274df3557445d1f73f80fa259b", 0x78}, {&(0x7f0000001900)="26d5562d10353c88dd0f43ccd63756b525aa3e8eebe9231ac4481f555f837a71eb3096401d3ba229c99507ca35b095b32a33123ae6f373565641133a152846653791a6efa9deee2c4f41dc669d869f7cf94d0590b7b5f77c278ffe19ed78ddeee6eb8e356e7d70c051f83b10f20f1f02b68db5427ec609c3ce7c68577081dfec623b5a26ce612ac3e49e2a8cb7518aec8140fa739cb2ef8bf165b703eb5837d4e8c5e99246a7693befa2fd427fa1ad4815f6d0ba879b30f52aeaceee050273b433e3ff875c73954514d3f819653ff2a1fd93deefe432ce6a5d9e7a886e", 0xdd}, {&(0x7f0000001a00)}, {&(0x7f0000001a40)="9d10c96977a244c8afdc2efae9f81aef43ea0e0c6feaa8d808c3fad332fc703fc0a65cccab2b22abcda14eb8fe42ae475f0c20e7eb3c99f5b1c560e0c7111eb9caea9808907d6030ed0a42a22ed0656eddefc6890e64d2688b05e7f44102b87f9e8d12dcc35c0cb1aa9104d53daeb39a278ccae5a42c3d016c52fb61f2c1286d8fd7631788fa3435d6a1d2aed709504d6276df7aa0ff01a07989206f80057cb84bf7e707a1f275127289f9153cea8a58c2d06b046c1ae9d165cde207cfe6a53da7418e3d7963779273c5eb8e809de73b95ede3cb1b4cd222e17a6e6cbc1aef2edc90f57f98a02c60174d49b1b268ddcb7934660db927", 0xf6}, {&(0x7f0000001b40)="5a8390ae1f2d4856446745ff24bed5d1c7e4882180490d18651452999340fcd8358c1dbec584420ae8fc19c0e7995fa11c1661739175d6866cabac04a74c0b50", 0x40}], 0x8}}, {{&(0x7f0000001c00)=@nfc={0x27, 0x0, 0x2, 0x5}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001c80)="9ef0af8e99b5faa7bc", 0x9}, {&(0x7f0000001cc0)="d9450f69de7e786212e6f0fa851b8ef50ef4e35f0a1b4357324d19f5e2fb1205e1aa5cc952c2b46f0ad8a3a9b1879dffb75879fb7edbd01a8a95591c4399079f916b9d1909433507cbd52a1fd499b418b79f3f6a3e5de205af289bcf5f4ccd917a02a0be9853aef64f6eeb6c5e001cec35f45c390b6508629180eba3da746b2b1caa135ea31d1487e315f09a70234acf31ada39ab94d140883d1982d3614edc20399da5f29f157513d4792e46f12ee", 0xaf}], 0x2, &(0x7f0000004f80)=ANY=[@ANYBLOB="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"], 0x110}}, {{&(0x7f0000001f00)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0)=[{0x38, 0x103, 0x20, "e372cfc025b192700bcdd5af55423372220a319906bb197167e0c0f420a7422f0a"}, {0xf0, 0x1ff, 0x6, "14813151730300b355393290dcc06edcc06286f387ec4337bef762532260fcb3b181493f2b55a1006b1146a0c1d216753ccf899b2c2cfcca6b52d632a4ab8f733b89d5b6023c94d1e0c3d7bb8de910a5a0d0298582ca4339eecc602899a3bb3671f29ce1c936106c2013e11215d0204717349b88064b1bd5fc1fe0e2f507d64e911f23d3924e9533818356252bad93d034abea8b2c8c0af9cf8e57a25a94d3071eb1715016dc29f938b3194825929d31793a2a98a276879ad043ee201c1b7eabb5b83f773b2b872ceb8175cc1227daa80024f87263985a09eabf5390"}, {0x78, 0x0, 0x0, "03e66930f576bbe590c3f8126aaeae73a56432965bd0f0b654daf48e4f2967ff9038d3f6361c76c962a53918a604adca57d83268eb78fd36f4b3b28776eaeb9617b7d88d50f4954d2551be8b51e8bace2479a3c3c2edc719eb21be46409924741a79f3df5c"}, {0x1010, 0x10a, 0x8, "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"}], 0x11b0}}, {{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003180)="a554557aa7f4ce8db29992f0811f6b45f3be95037ab8e0574750eefa2179716cbe58798544fba590e86b49f06247abe5b6f28b3a26259e6c28829bcddd4f41ee53ff540381693c72a2c46d87408ad2a55ef5278356bb40cf379bfebdddaec34196046db366391dba531ac51105892363a783141aa86d3323fa39a048f8d95fa41baf3b5f8d0ea87753e66e4a8343e2ec3d69ec4e9a62769d71fbb7fa0d78940e171aecc47e9faf604082eccd300b577d6acd8dc8dbae744e0b37191307f894cc2ab1056daf983f93ae74ed1a519d132e34375b54cc8cb23d3eba2e9e1add4e4fd3d68e0ea4b806bf52e27c6bb165", 0xee}, {&(0x7f0000003280)="e33281bc5adcbfe00baa0c301f9f04", 0xf}, {&(0x7f00000032c0)="5cb17bb3ea5d447755f3dce03f35e37360fc06e8a4d4d8968cc1d1ef6234f221acdd28209484d9809fc7a3b79d9978a24011210701f4f500fa2a32477d04ef7211f206f95e5bf783d829aa6596234f9c569a79cb95b2d6e78117ffc3", 0x5c}, {&(0x7f0000003340)="f82def277627d27b132e225a0a1c9d1163413644f26a8c606e8e35c7079418863ac0a85314d0", 0x26}, {&(0x7f0000003380)="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", 0x1000}, {&(0x7f0000004380)="9c6828c586eaba70e8ad4b526f8cc65953c2822f3bd78f8d6418a9c2929c3a0d515c2ba41eb46d7a0f54b976161d41fc9a10e0f3ed1e2c8604b80a766fa1c3d7c5fa409b607d3f46853211138395a3cefe037e0679d759fd918d295fdd95e353f82e2023e5773d14e5d13ecc456a7929f86f18caed3399069ca000a20ece41680b65626acce75c61c75148f0cd091e", 0x8f}, {&(0x7f0000004440)="c92904617e07de82b50749711e9ac2a0e4b8a4def6537beff1b5a43083edcc87cc2c769086dc442026bc5fa607d7a8e3ba8700d1c38be35a8728c9cf10c131ea3d37315fb15fce1e2599f0dd9dd482364b31d033abf5652af5a7e2b5735e48329ddb5abd25d6f6c7f6c854182f798a11aa02d70547a3fe00d138ef69", 0x7c}, {&(0x7f00000044c0)="26d3987a7128f3eb718de5ba2ce657c86d70fdd2f14ec86ebf302e94d0736086d797239403b6bf7f0abfe410919ea90e0720fcfdab4ffffecfa08734c4eecfbf9c77e18d24a086efc0c0cb1fd69821827bd0bdaf64d954bd647389548eae3a5847aed7ca8428acc2242ab1ca21a441803829be0868eadfb6f0daa9cac3e0f7077509e112a685a9b3465fd2bf87b982553d6d03a626d9a8353508c33306d371b57e7ed9574df4f1", 0xa7}, {&(0x7f0000004580)="b4ab40aaaf65ea24502661200e6aa8736c246e980ee42d02975717583168d47302e89e996cf5e47b0550edb5182aa3a430e8360b699d222a1368f1105518de17594a1c26fc603c3cf33aca615938e0f1f623086df2c1f391bc7c3d87e7d560a763ca2b1da1fb003d189231ccf8f02cb1d8fc1e5e0de65e2a309f", 0x7a}, {&(0x7f0000004600)="8ebec99c6cc8dc081fb94b2ec6e651b3028770b49a7e79e17379e2dfa71e78217ebfffbf3724548a38e862fdcb489588333b123057e52febe304ab0b943ef23e6c662605258f9cff9784ebcd8b37ff37017c9b40cf0b1d3e52602b17dd34eeee98c067494a8e9aa6f14710695f52ed0bdcc45ae3686355b886d344e7db00246a355f94e658175acba0d6a163519461dac3fa30c01f246aa21e7eb41184c067bdaf6a4b823b65d6a3734798cf7eb4791f82b0c4400b076538e9bf0e8067cff4939ae0aaeda207d0cd0981dbcff25e448c440993bc89cd09f3832d68b384c1a6a57a5f9d509c2bdf16d57c7a928e", 0xed}], 0xa, &(0x7f00000047c0)=[{0xa0, 0x101, 0x1, "39376f7844909a1715c6a2b699f3e144328ffa644a5d2e178365ab51e027253bbd95a6ebebbc477af84fc5cccaf803f21d7bb9e5efc176214ff7ef291cbcfbb10b80dc6ff43c80f9c120cc5c3e3df75954017dfde30660fe9d95bbd698ef22d72ea780d142f77e42c060acd26eb52b46725d29c22d34edbe38479b0e395d5a4369289e8effd8dccb9d9079"}, {0x68, 0x11, 0x81, "e2cea9e8e9750652b2134ead6ce87a4024ffedabfbe1c365eadb483cbd7a6e9f1dad891416461c5ddd197d29aa75045e2c65e28384c7c58abb7656c2b4a740772ac9a3a3def37578854c885b331ce75000f0bfbe"}, {0x28, 0x1ff, 0x8, "4eeecbc1be353ac443d813d2aae671313f"}, {0x70, 0x84, 0x70d, "2d5dbb3ebb45afd8c10390036e45f7eb75a0760d2fdcb0c777dc886178b1cf704d45f5286bef73ce3abcbaf784daf7f76dd697d7c8b2c21a46beb8fbee24130d3bed2cadab991cebbb4c24568384a0e6c6d1951fc7390284b3a10fdc"}], 0x1a0}}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000004980)="fa05b274fb2b4b4f28a4295104473a4eb2acbef87fc062c39642a567f4e623870b17decde85fe9ec67dcdf6226333ef3c148f5af0d781106e936ff1b39a3e7b241a09a2e7b06ff02b74b076019f2685c38de15d25ea4e1c24e2429e788fd630f3af1c0c6ece71c7d108fbb3d9db4ccabac895d89fcf54e41195bedebadc77ec113fa217fde6366d69ced92b9024f7b627f7c9970072794d9ad0cdca792872305f4e204f56b79750530a14188a65751c0f79be8a9e7b6a98f0d11df3d37563001e480a1eb667ed16a5fb5ca2b369016f3bf54c5bc8b9fae50923671166838c0d818f56139e59d07944af1335e9c589ed60441734e4fb6", 0xf6}, {&(0x7f0000004a80)="56e57de9eb44f5e91884728be2acd9dccc71c84959236970f2557841c5244f424620e237f409b16f02a4ad229c7c5e75a1c381d6e823a481cc38ab29279ce145bbdd5c6009399ff15edeb185a56834dd18de80ec7c9b66f401014700e9bb2b482aa831224626561b7125b0e197023c05b84cc77587d53fdad782397fec6cf4b16720af8a5209ae7a557147fe03470054", 0x90}, {&(0x7f0000004b40)="d42708a2c001a61d61a1c851b2e42a4f3470ef99100890afb7238471f22b35871d96e5506bd76689bc3103307c8764f62fe6ce7b899b3fc79d5d2f2fdb956d125a1ea631f2a33fdfe799fb41480734593fdb602841ae20867ac1", 0x5a}, {&(0x7f0000004bc0)="6a4a44c04faaf217cd55d349b2e5eac75130bbbacab55914c087232611ba6fa0ff9bdd695e8bba0318f5353a02bf343a547e4039979f1992dce1c9477b82de46c62018daa4caa08838b566c7685a345a64c6d68f11d54f522d665597e573c137c9407e4327dbcfbeb998e0363846771000764de70f72956ba776fc734c39e4d0717cad795d95d902d96aa571435b987fab2040ae", 0x94}, {&(0x7f0000004c80)="57b9a56a9869d9d4d190ca47e2c846caf770047fc0100a3137538343febcd94a435b2f212460a3809cb94443419dcd277725dbef5498e6d3961b12bd8481a520422b9d5271d9af14c037c502abfc917a05e7243bbceb9e488ac9811adad8e0ba2b14231d424e70982edac137a9bb3edfa4db1e28ad0f9a877f7012dccbe3549ed41cc2c04cbeb7168c09d9d6130b8aadf4fd6a6ed9d0a0c7817f3dd3339a5f6f3ba4035bb30c6d1fea0580b4d1508a5f6e57986d68f5cc1515b8dd89509b7ce396e9729a04cffda4258ec2632e2de7da91c67bb50c768103171c472a69871dc4e8", 0xe1}], 0x5}}], 0x6, 0x4000004) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x365, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d, 0x2}], 0x0, 0x0) 08:45:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xfd\xfd\xff\xff\x00', 0x43732e5398416f17}) 08:45:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x800000000000000, 0x0) 08:45:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:36 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x100, 0x84000) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000002c0)) r1 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r1, 0x10d, 0x2, 0xffffffffffffffff, 0xb3c3650a5f3df8bf) futimesat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={{0x77359400}}) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000280)) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:36 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8002000000000000", 0x37}], 0x0, 0x0) 08:45:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x1000000000000000, 0x0) 08:45:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:36 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000000000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x7f\xff\xff\xff\x00', 0x43732e5398416f17}) 08:45:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x2000000000000000, 0x0) [ 451.784465][T15347] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="01fb3f8bb27eb0000fa8"], 0x0, 0xb}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x102000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7fffffff, 0x10f000) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000240)={0x2, @pix={0x48c309ad, 0x1, 0x357f7f5f, 0x3, 0x4, 0x7, 0x7, 0x5cb, 0x1, 0x2, 0x3, 0x7}}) 08:45:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xe4\xff\xff\xff\x00', 0x43732e5398416f17}) 08:45:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x2010000000000000, 0x0) 08:45:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:37 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8002000000000000", 0x37}], 0x0, 0x0) 08:45:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4000000000000000, 0x0) 08:45:37 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), 0x4) 08:45:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xfe\xff\xff\xff\x00', 0x43732e5398416f17}) [ 452.637463][T15575] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4800000000000000, 0x0) 08:45:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:38 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:38 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000", 0x53}], 0x0, 0x0) 08:45:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4c00000000000000, 0x0) 08:45:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\xff\xff\xff\xff\x87\x80\x00', 0x43732e5398416f17}) 08:45:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6800000000000000, 0x0) 08:45:38 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x7) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000240)={0x1000, "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"}) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 453.473281][T15750] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x6c00000000000000, 0x0) 08:45:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x43732e5398416f17}) 08:45:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000", 0x53}], 0x0, 0x0) 08:45:39 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x4000, 0x0) accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x202080, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x7}, &(0x7f0000000240)=0x8) r3 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x8d9f, 0x29e083) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0x9, 0x200, 0x8fc, 0xffffffff, r2}, &(0x7f00000002c0)=0x10) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000340)='syz1\x00') 08:45:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7400000000000000, 0x0) 08:45:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x7a00000000000000, 0x0) 08:45:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x43732e5398416f17}) 08:45:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 454.280437][T16005] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:39 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x0) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000080)={0x10001, 0x9, 0xad5}) 08:45:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x8cffffff00000000, 0x0) 08:45:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5005f00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x43732e5398416f17}) 08:45:39 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x304}, "0a754419fa040687", "41053d75d012f79bf1d56dfc3b5d8702", "42bf4b6b", "c8c2e0ea18a80cc1"}, 0x28) ioctl$BLKRRPART(r0, 0x125f, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000240)="08b823b6d7426c0f5f0b9c50d78d12e13d47525c87598e6349dc8cf3dfeb602c2eb1fa3b18375cba84cff383760e88aec9f7647271cee063d9901f9360a82288692ae3fa100c05b0212f258458583e2826bebc307e52ce2a75e77633d2536f887420dc7ddc5f2550fb2247edf3aeca611e0d20edd5635261b2fc7f688f3d798d2a0a6e142d255cf40cd3084d011a0372b64de14b73409fc542d16a978b48ffe98563f1d8814306a83f5676860387aea933e24c1a83664d3f9ef4a5", 0xbb, 0x4}, {&(0x7f0000000300)="e0dcc3052e9b1a2cab9afd4c38acc856f2ee5cc9808bf091c3e441ce36b430dfe8c41fc7098bf94dd7b2c2b61a9411973a6d60725b22c263bfbd2d9fccf475d0021ff3033a1b7434b096aae9457f89f606a742a8ac1b7504a08c633d95d8a3e4763477dae79393bfc68f0479563b0c9fe12d0e0fd54110f1fe44bf5c9fcf112d9c6509bd7968f80c2a82e522644367f0d62b5944b5c579334abf48062da108fd12756391dbacec7b870e8e05ebd04af2f28b557eb66c33541acd88e0208d4f194c810c39f3656259f0913b21c8cf8b0a7498e839c48f6a30a9b6f2", 0xdb, 0x4d55}, {&(0x7f0000000400)="e6a2d2d51a241eea7cd2f1d8d70fbbc7846c5c8579133fe504a38ef768d358acf703c9e7edad1835a62b23e5142c1682952e737dc57c20fb0fceb2a11512686243a5922eafbe90bc4d45c308afb1500a92dbb359c1baa661c32a1199afb238f8b69281a2ce347cbf48c829d96b744273f9551c9ad6b9ad1066009756d30ee81d13a975701ef624", 0x87, 0xd5}, {&(0x7f00000004c0)="1819c462cf1220ec1cabb034963f5326606f9a8027b16dfa8745e45e3daf4e4601d3c2cf6bfcdd6dfc8aa7ad6ec55315d01584224d5be76be85b5a99cef2f52589796e67faef311981452e0ac2b2393a3c26d791dc118fea84b48cbd50ed9ccdf682ed51395ea932fa6e0485a5edeae5bf90b4020f3104e3cb30c293087127be6f5dd5a42889ad920a584fcd37fd5fb6eacc594f3444745ef22590645bba340aa9766b5925673a43401540500b702123569e7c7597c9eed649f11925e1b4d7aa34ae3c1d77aea8161f3e1d454bb55a90610861b6e06f64", 0xd7, 0x694}, {&(0x7f00000005c0)="5c84dba6d376229b28a4ecde990f5ca0a5f019e70f65766758eff41f539ad8afd68db63f55aa552ecdbd4bea53f42725efcc8719eaa73283561910a7f162158a1f2cc81ff3a6e3ca8a64d76178cac27bb26a6db9b17b66640232ea551ae0c91a70a1e75fe2338b505e8fd273b68688e44f0873e1512a3db962733c1998f3492b3a6b97ed7ce0a1172019957bc95595d92105d3739ea21123d1995ec95bb363190a50fd093cd20ce1dea52625e31d143af76c63a91359f784fce4a54cee6a920a049ae23054d1c4783fa79d9d4f2097649a07a77aee37c64db5ae288acf008c5300546e5154d663695ea7bc232a", 0x15c, 0x7fff}], 0x0, 0x0) 08:45:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c0000", 0x53}], 0x0, 0x0) 08:45:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf6ffffff00000000, 0x0) 08:45:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f17}) 08:45:40 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x19c, &(0x7f0000000100)=[{&(0x7f0000000340)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040cc418974c402667c2e166fc5905f83d38f4728fe1c0de833118847c82d93ba28e9ea2a9b2d88554b9c6bb92485b7667e6fc7f5744ca1057689bf071cf500c9e9ccb7f08231d00"/204, 0xcc}], 0xfffffffffffffffc, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x401, 0x5, &(0x7f0000000600)=[{&(0x7f0000000240)="410624213134523a531574b5bf1c080263a05538a2942bf1b02d4ae9ab1b22ababe1ee27a37d39de4ff2b5bd67ab570dc21f3e7e488e0e3664679c63535e461069d9c40249328d0f19293b1872430789ba7f85de53665e3fdcb8de32ea8bbb5e7ceb1de73236b837202356ccbf90638e28fda6998f7ba22af1c6b3b7d7752ce768cf73be4e174fe141695c018b6a08b0334f8cdd293a56f078599216e7cb0046201588d95fe542c86c2d30c9b38e6e30cbc22d34c19d02793ffbdd834973e68eda86ee3e41f14ad4e0cf0f8d8b09d209aa234ab770a1ceb5d42204e78af41a858b7f8c7bf81af70feb2b9e", 0xeb, 0x3}, {&(0x7f0000000440)="7d19e63eafef20404bd054e0247983f2d4605776919979c1dfcff5371f245edfa8354403ceb004aec9d8cec96c060ca072611a80395116944b5f24a3888555bf3be6aca061df2b3d5c48c76c45393d17f002f68736abd3b38834c7ed66ee8b58118a50fee0b599e929c76b729876da0f55e847b10e1a6207f59d7ff10f12a0128441d1434eae8d27a035c97c1e3f5748530f1761844f934a709b928fb99e7128d7900b0d2508fb3786028c9f8dbe463b5a022243355af700", 0xb8, 0x10001}, {&(0x7f0000000140)="807451bbafc5a88ab7cc8cd7fc728a0e9892578ecb3c20e6f62b5635e28b7639dde936551a2084", 0x27, 0x200}, {&(0x7f0000000500)="2b1e6dfad3ad125bf8591ad6db630fb0a500759cd04a8dba3d4597a86ea142f6c4024fd6b96b8dff9f891b9bb7c2de693c4753f5e8dd43d23737912890f3afeb47d10f82d6d4211f4d516cf6095ffc482ec957f7ae6a319df2eccc02efd830ec16235fa60836b1660301aa02bb2dfc56467afa842d350dcf9f4e19d9a8f4af7942bea23834cb0e9ee9e37475fb162f48f77c72a3be48adf1a0b8a19dbaf38f3928bf0a229ea142e408e0208ae05e95c79b9e2597e8b730adc4fad99f2378352a21c3991c3f31364ff8469328473dcc1aad6980821113d633fafc4f874d29d8d859b72d88db", 0xfffffffffffffdf0}, {&(0x7f0000000180)="00fa19249d1434817f91efd8be6c583d9db1ff3588f439179784", 0x1a, 0x2901e153}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='mtpt,nodiscard,norecovery,pqnoenev=./file0,logdev=./file0,rootcontext=unconfined_u,dont_measure,\x00']) fcntl$getownex(r0, 0x10, &(0x7f00000007c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000740)={0x2, 0x70, 0xfffffffffffffff8, 0xfffffffffffffff7, 0x80000000, 0x5bd, 0x0, 0xd9, 0x2100, 0x8, 0x6, 0x8000, 0xff, 0xffff, 0x5, 0x2, 0x6, 0x6, 0xffff, 0x7, 0x4, 0x7fff, 0x101, 0x6, 0x400, 0x80000000, 0x400, 0x400, 0x221e, 0x1000, 0x9, 0x3, 0x101, 0x9a0, 0x800, 0x7f, 0x0, 0x3548, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000700), 0x9}, 0x8000, 0x7, 0x8, 0x6, 0x1, 0x3, 0x3ff}, r1, 0xe, r0, 0x9) [ 455.155025][T16305] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xf9fdffff00000000, 0x0) 08:45:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:40 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000003c0)=0x800, 0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x241, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000240)={0x7, {{0xa, 0x4e24, 0x9, @mcast1}}}, 0x88) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x7) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000340)=0x1, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000180)='security.evm\x00', &(0x7f0000000300)=@v2={0x5, 0x0, 0x6, 0x9, 0x23, "664498456f2920ff42018c5678e188c44e9612b8a70207796bdfb28f8b09bddaf5cc7e"}, 0x2d, 0x2) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 08:45:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x43732e5398416f17}) 08:45:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xff00000000000000, 0x0) 08:45:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) 08:45:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0xfffffffffffff000, 0x0) 08:45:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x100000001, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000180)="f4c071248aea22c41f25d3795515a2aa5222dc7c3e917062f40e5aac94dde6043422ff8440f91a30c5e1baff2453208086d2a9d0f92856a0b3939696bc250f3742794a1cbbf6ee8f2bc90212cde9042259fd587e51ec4042036592357b7ff51b9782c46d36288aac5f111e8d1ef2d2b1704dd0cd55931f5c0166ac24a3cc2ae2c6f626001a20533f37bf7b6e7ccb89d8576d39996b943672a281fce4b379fe908a21fb541d4da5f11d5631b61fcdc2915abfb3120a7094bbafaa35f831ab6175aac3", 0xc2, 0x100}, {&(0x7f0000000280)="ed6d7b7b40842c809ffa9d0c7f7be393f158b9183e1da0ce0b9c33021c7ca9ec", 0x20}, {&(0x7f00000002c0)="6bcaf6296783d047d96da3b1136a3d9b42ca9e2dbac6eaa05a21b9701a42700f6a0e2a6600253871639adfc588ebf87b5eda14c2a63a648079a7d28b8cac8dc463949e830ce83b45f4a1cb916ee63d44e4fc6cc87ecbdc6551022a5541f74fb0d6ac62adf99f185deefdb47e230261c107686f21f176de43a2327eceb5e2932689a5f0e371e51f20879f243bbcb64adad29ab0c90689b1d3c8713deb22bb1c586fdee5", 0xa3, 0xbfe4}, {&(0x7f0000000380)="7872b95cc3f84f8abac48dd26391", 0xe, 0x81}, {&(0x7f00000003c0)="e6b36a6a88b61dffa9063f7581da6e98f2bd92e10fa18a85df5a611ebb734cc7a879fd9802339e7c9fa6c9c4c60e23bd0cc27c70ea693941dc8cb4b287b39e3a7b875b5b7c04f1caf2bbc4218821ce442b4a1528094d7dd1450ac8cc16ced4104dd093ccaeab80c6d2dc47e91ecdcde3590db4a4c2eb269391fce143c07195feeab12b06be941bfa719d38163d46f9f755063e0a9bb1df3b54c6a86c76d119abab7212135ef50d1735b8c0d46197847119c5ebd74312572976253e3d45f9df", 0xbf, 0x2}, {&(0x7f0000000480)="65d2e90492aac99f0b1337c7da20abf3", 0x10, 0x3ff}], 0x0, 0x0) 08:45:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x43732e5398416f17}) [ 455.967682][T16607] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000200)=0xe8) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x0, &(0x7f00000001c0), 0x40000, &(0x7f00000003c0)=ANY=[@ANYBLOB="756d89486b3d3078303030303030303030303030303063312c75737271756f74612c726573697a653d3078303030303030303030303030303430312c646973636172642c756d61736b3d3078303030303030303030303030303030322c696e746567736974792c696f636861727365743d63703835352c7569643d", @ANYRESHEX=r0, @ANYBLOB=',discard=0x0000000000000009,resize=0x0000000000000009,dont_appraise,defcontext=user_u,permit_directio,obj_role=ubifs\x00,smackfshat=bdevcgroup,subj_type=security.selinux\x00,defcontext=staff_u,\x00']) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:setrans_var_run_t:s0\x00', 0x27, 0x1) 08:45:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:41 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) 08:45:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x43732e5398416f17}) [ 456.479986][T16741] UBIFS error (pid: 16741): cannot open "./file0", error -22 [ 456.644744][T16741] UBIFS error (pid: 16741): cannot open "./file0", error -22 08:45:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) 08:45:42 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x1000) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000240)) 08:45:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 456.834641][T16803] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x43732e5398416f17}) 08:45:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 456.951247][T16877] UBIFS error (pid: 16877): cannot open "./file0", error -22 [ 456.961078][T16877] UBIFS error (pid: 16877): cannot open "./file0", error -22 08:45:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x9e2}, 0x28, 0x1) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:42 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101002, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x1}}, {@access_user='access=user'}], [{@appraise='appraise'}, {@dont_measure='dont_measure'}, {@uid_lt={'uid<', r2}}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'eth0'}}, {@obj_role={'obj_role', 0x3d, '/dev/sequencer\x00'}}]}}) ioctl$TCXONC(r1, 0x540a, 0x7ff) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000000000", 0x61}], 0x0, 0x0) 08:45:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x1f\x00', 0x43732e5398416f17}) [ 457.338100][T16997] UBIFS error (pid: 16997): cannot open "./file0", error -22 08:45:42 executing program 2: prctl$PR_GET_DUMPABLE(0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='coda\x00', 0x0, 0x0) [ 457.347945][T17000] UBIFS error (pid: 17000): cannot open "./file0", error -22 08:45:42 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x7fff, 0x800) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)={0x0, 0x8001, 0x3, [0xffffffffffffffff, 0x6, 0x800]}, &(0x7f00000002c0)=0xe) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={r1, 0x1}, &(0x7f0000000340)=0x8) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00 \x00', 0x43732e5398416f17}) 08:45:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1000, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getgroups(0x2, &(0x7f00000001c0)=[0x0, 0xee00]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffc00}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@euid_gt={'euid>', r3}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) 08:45:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 457.810902][T17114] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:43 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000240)=0x1c) fcntl$getown(r0, 0x9) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, r1) [ 458.019580][T17243] UBIFS error (pid: 17243): cannot open "./file0", error -22 [ 458.032343][T17243] UBIFS error (pid: 17243): cannot open "./file0", error -22 08:45:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f6669ec653000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x0f&\x00', 0x43732e5398416f17}) 08:45:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 08:45:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:43 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 458.392288][T17365] UBIFS error (pid: 17365): cannot open "./fiìe0", error -22 08:45:43 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x8000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 458.610880][ T8921] XFS (loop0): SB sanity check failed [ 458.616501][ T8921] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:44 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x800, 0x141000) getpeername$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000900)=0x14) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000500)=0x80000000000, 0x2) bind$bt_hci(r0, &(0x7f00000005c0)={0x1f, r1, 0xffffffffffffffff}, 0x2c0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x9, 0x10100) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000540)={'hsr0\x00', {0x2, 0x4e24, @empty}}) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r4, 0x701, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x80000001}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20040881) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'teql0\x00', r3}) [ 458.680945][ T8921] XFS (loop0): Unmount and run xfs_repair [ 458.712612][ T8921] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 458.746073][ T8921] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:45:44 executing program 2: mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00@\x00', 0x43732e5398416f17}) [ 458.830513][ T8921] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:45:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 458.897897][ T8921] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 458.937275][ T8921] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:44 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000240)={{0x4, 0x0, 0x93, 0xfffffffffffffc00, 'syz0\x00', 0x7}, 0x1, [0xf, 0x81, 0x2, 0x1000, 0x81, 0x9, 0xfff, 0x9, 0x3, 0x4, 0x0, 0x7fff, 0x10001, 0x1, 0x4, 0x7e, 0x8, 0x1000000020000000, 0x1, 0x8001, 0xffff, 0x6, 0x4, 0xfffffffffffffff9, 0x8, 0x9, 0x7, 0xfff, 0x20, 0x5, 0xff, 0x0, 0x2, 0x98, 0x3800000000, 0x8, 0x0, 0xdbe, 0x7, 0x4, 0x7, 0x3, 0x4, 0x46b, 0x1, 0x7, 0x8000, 0x6, 0x1, 0x0, 0x45e, 0x1000, 0x9, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x200, 0x100000000, 0x3, 0x3, 0x7, 0x2, 0x7, 0x0, 0x15, 0x401, 0x93, 0xff000, 0x0, 0x4, 0x100, 0xdb0e, 0x3, 0x4, 0x6, 0x1, 0x4, 0x3ff, 0x2, 0x4, 0x8, 0x7fff, 0x7, 0x9, 0x6fe2, 0x80, 0x81, 0x5, 0x1, 0x81, 0x1, 0x1, 0x43a, 0x7, 0x5, 0x80000001, 0x62bb, 0x2, 0x0, 0x200000, 0x7ff, 0xe7, 0x4, 0x81, 0xedd, 0x8, 0x2c1, 0x1000, 0x4, 0x7, 0x1, 0x7ff, 0x9, 0x1, 0x6701, 0x20, 0x1ff, 0xffffffff, 0x0, 0x6, 0x2, 0x6, 0xffff, 0x7, 0x8, 0x0, 0x2, 0x8001], {0x0, 0x1c9c380}}) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000007c0)=0x90, &(0x7f0000000800)=0x4) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@rand_addr, @remote, 0x0}, &(0x7f0000000740)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000780)={'bridge0\x00', r1}) [ 459.027081][ T8921] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 08:45:44 executing program 2: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x2e) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x20) [ 459.081731][ T8921] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 459.142803][ T8921] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 459.202759][ T8921] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 459.249003][T17368] XFS (loop0): SB validate failed with error -117. 08:45:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 08:45:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:44 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x80000, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x8) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f00000003c0)={0x7, {0x1, 0x3, 0x3f, 0x5}}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)={0x400, 0x127b9d99, 0x80000001, 0x3, 0x30}) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) r3 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) sendto$llc(r3, &(0x7f00000002c0)="e496ec66791dbfef231e47e0a7eb9855a91b2c8a496340e01ee4e9b27c4315003c0fba863a4107b153eea54e6058223085cdd7d0dca9a08e40c2f835aefdf57c93af87f78a633abdf31bbf810ea36d8339", 0x51, 0x40440c5, &(0x7f0000000340)={0x1a, 0x102, 0x7, 0x1, 0x8, 0x101, @remote}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@local, @in=@multicast2, 0x4e22, 0x1f, 0x4e23, 0x9, 0xa, 0xa0, 0x20, 0x89, 0x0, r4}, {0x0, 0xd5, 0x3, 0x400, 0x100000000, 0x8, 0x2, 0x3}, {0x200, 0x9d77, 0xffffffffffff870f, 0x101}, 0x8001, 0x6e6bb2, 0x1, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d5, 0x32}, 0x2, @in6=@ipv4={[], [], @multicast1}, 0x3504, 0x3, 0x1, 0x7, 0x1, 0x200, 0x3}}, 0xe8) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x84000, 0x0) ioctl$UI_GET_SYSNAME(r5, 0x8040552c, &(0x7f0000000240)) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000400)={0x8, 0x5, 0x10001, 0x7, 0xf, 0x1, 0x3, 0x4, 0x4, 0x100000000, 0x7fff, 0x10001}) 08:45:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00H\x00', 0x43732e5398416f17}) [ 459.686003][T17737] UBIFS error (pid: 17737): cannot open "./file0", error -22 [ 459.703227][T17786] UBIFS error (pid: 17786): cannot open "./file0", error -22 08:45:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") recvmmsg(0xffffffffffffffff, &(0x7f000000c080)=[{{0x0, 0x0, &(0x7f0000007e80)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000240)=""/230, 0xe6}], 0x5}}], 0x1, 0x200000, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x0, 0x2) bind$bt_sco(r2, &(0x7f0000000380)={0x1f, {0x919, 0x8, 0xfffffffffffffffd, 0x800, 0x8, 0x2}}, 0x8) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x8) sendmmsg(r1, &(0x7f0000007e00), 0x40000a3, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x80000, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000180)=""/59) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000480)={0x0, 0x1c, &(0x7f0000000440)=[@in6={0xa, 0x4e22, 0x9, @empty, 0x401}]}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000500)={r4, 0x1, 0x1}, &(0x7f0000000540)=0x8) 08:45:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@in6, &(0x7f00000000c0)=0x80) mount(&(0x7f00000001c0)=@sg0='/dev/sg0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='bfs\x00', 0x9, &(0x7f0000000300)='ubifs\x00') getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00L\x00', 0x43732e5398416f17}) 08:45:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 460.102476][T17923] UBIFS error (pid: 17923): cannot open "./file0", error -22 [ 460.114932][ T8909] XFS (loop0): SB sanity check failed [ 460.129841][T17965] UBIFS error (pid: 17965): cannot open "./file0", error -22 [ 460.155432][ T8909] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 460.223938][ T8909] XFS (loop0): Unmount and run xfs_repair [ 460.247177][ T8909] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 460.276400][ T8909] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 460.292373][ T8909] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 460.317498][ T8909] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 460.338301][ T8909] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 460.351102][ T8909] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 460.366240][ T8909] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 460.376640][ T8909] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 460.404358][ T8909] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 460.415732][T17846] XFS (loop0): SB validate failed with error -117. 08:45:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 08:45:46 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x6, 0x4}, {0x1000, 0x9}]}, 0x14, 0x1) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) mount$9p_virtio(&(0x7f0000000040)='wlan0nodev\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800000, &(0x7f0000000100)={'trans=virtio,', {[], [{@appraise='appraise'}]}}) 08:45:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00h\x00', 0x43732e5398416f17}) [ 460.864858][T17993] UBIFS error (pid: 17993): cannot open "./file0", error -22 [ 460.874544][T17993] 9pnet_virtio: no channels available for device wlan0nodev [ 460.888739][T17993] UBIFS error (pid: 17993): cannot open "./file0", error -22 [ 460.890157][T18065] 9pnet_virtio: no channels available for device wlan0nodev 08:45:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5006f00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x5, &(0x7f00000001c0)=[{&(0x7f00000002c0)="4d65556585366848d7dc459f9b1d9b0ae0da8791f17555730aac1c3f1ccb648ce1550af474112e1635600d1320ebe1620a76cc66b301e5d8324eb21b22a59d217796234cc8c854c0ddba16af73f17577c55fa8239bf5340a7eeac278c3158b33d4e21effc209abda02df5f82cafe0acc952cb3772fdaa705e45144f1eb5ec258b1482e037abc6b1c7461f5ae717d0dd02ae17f473aaf119f2a1fa6a9952acca8ec1cbbd3b95ffce49bd27d8f4b841e1032", 0xb1, 0x9}, {&(0x7f0000000100)="984020b1b3b83399c7be0da8a9045e6a3f5812c765965b5248aa3d4277473b7657331da39d97e7cda0ca822eec01ba41b8f1c66265464977", 0x38, 0x400}, {&(0x7f0000000380)="b4f15216113a43a0e019655b179ed18239e7f6674dbfe32fb690d2de8076c196c28aa993caed0f1ed573aa328b571de7e0b19592cc40f1ecd98388c0a0da3626972524f8efbba25e31b02ac42d10f91ba1247dbd99ec0b7640ad5b1e748c1a6c7f2894b506a2480e726d5fad385799b274f45965a28a0453bebce6539a935eba27034e9a4270c0021bde06da740b347bebc2e03ee0a634320795601486851e34f642", 0xa2, 0x5f8ed42a}, {&(0x7f0000000140)="71badb3405be7ce61d0cc7394266a5d77b513fe04b924503", 0x18, 0x1}, {&(0x7f0000000440)="c64785edeca8863b5800b9193ae6c28b7a612b4d7bfdb01ca4c8ffa71bb8a5fd4e333494763cd1267d75bc7fd5de9e0c15eb08ea68c6605e5d5f7c4b528361a6774c595e7d9ffae54eccb5a69c2ea765823ffdc33c1afb29a3dc654e4b0bbc5053da94f7b3ad1fc017f30802b9a7dbcf453e9e8ca58fdc82ab2c700547ffc9411c3b67b86d565e9c1c1518ba4ba40a5bcae49e802932023e6e4b3970cca6329186bc64f7b21fc4b25010", 0xaa, 0x8000}], 0x80001, &(0x7f0000000500)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ppp0lovmnet0selfvboxnet1&lolo\'wlan0/eth0('}}]}) chdir(&(0x7f0000000040)='./file0\x00') 08:45:46 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000180)) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f00000001c0)={0x2, 0x7, 0x1}) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00l\x00', 0x43732e5398416f17}) 08:45:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 461.199380][ T8921] XFS (loop0): SB sanity check failed [ 461.224232][ T8921] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 461.323603][T18182] UBIFS error (pid: 18182): cannot open "./file0", error -22 [ 461.354142][ T8921] XFS (loop0): Unmount and run xfs_repair [ 461.395290][ T8921] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 461.403861][ T8921] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 461.445622][ T8921] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 461.455149][ T8921] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 461.464481][ T8921] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 461.476102][ T8921] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 461.511016][T18182] UBIFS error (pid: 18182): cannot open "./file0", error -22 [ 461.539623][ T8921] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 461.581262][ T8921] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 461.598068][ T8921] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 461.608032][T18105] XFS (loop0): SB validate failed with error -117. 08:45:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000", 0x6b}], 0x0, 0x0) 08:45:47 executing program 4: r0 = socket$inet6(0x10, 0x400000000800, 0x26a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="5500000018007f0a00fe01b2a4a280930a060001fe8000065d0000003900090023005000060000001900054003000000000022dc1338d54400009b84136ef75afb83de4411560100c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1710}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000280)={0x3, &(0x7f0000000180)=[{0x400, 0xd2, 0x1ff, 0xfffffffffffffff7}, {0x36c, 0x5, 0x3ff, 0x3ff}, {0x6, 0x3, 0x479c, 0x2}]}, 0x10) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x602000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) r2 = getgid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xe8) r8 = getegid() write$FUSE_DIRENTPLUS(r0, &(0x7f0000000680)={0x290, 0x0, 0x1, [{{0x1, 0x1, 0x9, 0x0, 0x1, 0x4, {0x0, 0x0, 0x100, 0x1, 0x8, 0x1ff, 0x1, 0x3, 0xfffe00, 0x5, 0x3f, r1, r2, 0xe1, 0x1}}, {0x5, 0x1, 0x6, 0x3, 'ubifs\x00'}}, {{0x3, 0x1, 0x2, 0x9, 0xcbf, 0x10000, {0x0, 0x9, 0x7, 0x3, 0x0, 0x4, 0x101, 0x101, 0x7f8, 0x10000, 0x100, r3, r4, 0x7, 0x9}}, {0x1, 0xffffffffffffffff, 0x6, 0x3f, 'ubifs\x00'}}, {{0x4, 0x1, 0x1, 0x800, 0x4898, 0x9a, {0x0, 0x1f, 0x100, 0x7, 0x5ad5, 0x6, 0xa9, 0x8, 0x1, 0x0, 0x91, r5, r6, 0x200}}, {0x2, 0xaa, 0x6, 0x101, 'ubifs\x00'}}, {{0x3, 0x2, 0x6, 0x80000000, 0x8, 0x8, {0x5, 0x1, 0x100000000, 0xffff, 0x3f, 0x7, 0x400, 0x9, 0xb206, 0x10000, 0x5, r7, r8, 0x3}}, {0x0, 0x268b, 0x6, 0x2, 'ubifs\x00'}}]}, 0x290) 08:45:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00t\x00', 0x43732e5398416f17}) 08:45:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsJ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 462.105331][T18258] UBIFS error (pid: 18258): cannot open "./file0", error -22 [ 462.146332][T18258] UBIFS error (pid: 18258): cannot open "./file0", error -22 08:45:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:47 executing program 2: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ext3\x00', 0x800801, &(0x7f0000000100)='vboxnet1mime_type/\xd7vboxnet1posix_acl_access\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:47 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000240)={r1, r2/1000+10000}, 0x10) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 462.249177][ T8921] XFS (loop0): SB sanity check failed [ 462.258925][ T8921] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00z\x00', 0x43732e5398416f17}) 08:45:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 462.334575][ T8921] XFS (loop0): Unmount and run xfs_repair [ 462.353516][ T8921] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 462.368235][ T8921] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 462.407895][ T8921] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 462.498188][ T8921] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 462.530647][ T8921] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 462.532379][T18392] UBIFS error (pid: 18392): cannot open "./file0", error -22 [ 462.556073][T18415] UBIFS error (pid: 18415): cannot open "./file0", error -22 [ 462.572389][ T8921] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 462.597133][ T8921] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 462.637120][ T8921] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 00 00 00 00 00 ....4........... 08:45:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 462.651694][ T8921] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 462.662205][T18278] XFS (loop0): SB validate failed with error -117. 08:45:48 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000", 0x6b}], 0x0, 0x0) 08:45:48 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:48 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xc2042, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000180)={0x33, 0x6, 0x0, {0x2, 0x0, 0xa, 0x0, 'eth0cpuset'}}, 0x33) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x800000000000000, 0x3}, {0x8, 0x4}]}, 0x14, 0x2) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000000140)=[{&(0x7f00000000c0)="e04c37a673f5ce3353732b537ec17ba1be65545d1e57c4ae177ae8d0944f9902205a003fc6f6b1141b9cca041ba77a7cea571b0423b260afdf07adff50124eae0a90a3b2abfbe685449b59e48a5e4a40e340fcc1b455310cfc2951a435727b0a1ec821085d878097b71044b2d8af97", 0x6f}, {&(0x7f00000001c0)="1d9901292d9bc65a87d8aac2b021e4fc0ae1f00975eb7dc8863ee04af0f6ce42f1e74574677b2b76f0ac021b0760518d2eb03fbe9b9f5fbe14508f9cbec7c8958e9ab711afde7f5e75db780a4fe4ce4b779a3f1d6cf15ea2f9dcb5af4b792778a6ce815652c31fc64e62", 0x6a, 0x1}], 0x100008, &(0x7f00000002c0)={[{@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x5}}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x64, 0x62, 0x7d, 0x35, 0x31, 0x39, 0x65], 0x2d, [0x36, 0x66, 0x63, 0x61], 0x2d, [0x7f, 0x3d, 0x31, 0x3d], 0x2d, [0x64, 0xe08bcc14e9d03e47, 0x0, 0x33], 0x2d, [0x3d, 0x37, 0x7f, 0x37, 0x35, 0x61, 0x7b, 0x77]}}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, 'ubifs\x00'}}]}) 08:45:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xdd\x00', 0x43732e5398416f17}) 08:45:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsd', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 463.067283][T18512] UBIFS error (pid: 18512): cannot open "./file0", error -22 08:45:48 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0xffffffffffffff4d, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r1 = getuid() fstat(r0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x1, &(0x7f0000001240)=[{&(0x7f0000000240)="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", 0x1000, 0x3}], 0x1810000, &(0x7f0000001300)=ANY=[@ANYBLOB='quota,smackfstransmute=xfs\x00,euid>', @ANYRESDEC=r1, @ANYBLOB="2c705180ffb44b08a5681d26704f63723d30fb3030303030303030303030", @ANYRESDEC=r2, @ANYBLOB=',\x00']) [ 463.151868][T18625] UBIFS error (pid: 18625): cannot open "./file0", error -22 08:45:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000002c0)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000480)=0xe8) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x200000, &(0x7f00000004c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x9}}, {@sq={'sq', 0x3d, 0x7fff}}, {@sq={'sq', 0x3d, 0x7fff}}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffffffff5f5d}}, {@uid_gt={'uid>', r0}}, {@uid_gt={'uid>', r1}}, {@uid_lt={'uid<', r2}}, {@fowner_gt={'fowner>', r3}}]}}) 08:45:48 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xde\x00', 0x43732e5398416f17}) [ 463.347804][T18627] XFS (loop0): SB sanity check failed [ 463.359018][T18627] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 463.378948][T18627] XFS (loop0): Unmount and run xfs_repair 08:45:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsi', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 463.477625][T18627] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 463.482606][T18652] UBIFS error (pid: 18652): cannot open "./file0", error -22 [ 463.509014][T18627] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:45:48 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 463.639286][T18627] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 463.662188][T18627] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 463.684080][T18627] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 463.694179][T18627] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 463.703362][T18627] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 463.714416][T18627] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 00 00 00 00 00 ....4........... [ 463.748904][T18627] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 463.787291][T18627] XFS (loop0): SB validate failed with error -117. 08:45:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 08:45:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:49 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000300000058000100100000040000000000007a300000000044000408200001000a00000000000000040000000000000000000000000000000000590f0774abb442e7f7abbc707a70c9200002000a00000000000000fe8800000000000000000000000000000000000000000000007f9edeba0693e8e093233fd30402a9defa5cf30a97084e98a489c288fc054ba0abae40be9a08acce92c7e6cdc47f50fd1f62d1625c264da8f3fab87cff6a3a6e71cc4734701b81abfc04b01a63b2b8921d0bb86a49db92cca729b70bd713f8e121d50ed8e398e0207742"], 0x6c}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="2000fd03dac4180b895701e20a00000073797a30001f0000"], 0x28}, 0x1, 0x0, 0x0, 0x4000044}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000440)={{0x1cf, 0x2, 0x8, 0x1e8, 0x31f, 0x80000001, 0x2cb, 0x5}, "37935a455724270cf0def172a237934000a271d462e4568f65c9291c3e986113554daaae006fa78bebd4df07873b3f1674dd71bcd4e09eb2d5e68c5735ca2a92524c8c0c0959f4e7ea32f9deba145d5b1321923449fffd8a88b448b42ee1e765372d7c718023728dcf6a5e0e418391cd9a5c7216d966bb6c1ea9128f84d77f3b06461a3a5a8a4ec82b71717ff81b4a73ca5f75cbef5b39bb92dccac8fd865d56e87dbbcae2a0c89e2a3bbdcf50ffce1d7efb6b2ac4c0ea0cd9d3270976492e23648c776d975989fecf78eaa38fb7419b104214fb07fd064044cd04b054", [[], [], [], []]}, 0x4fd) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0xaaaaaaaaaaaad70, &(0x7f0000000100)=[{&(0x7f0000000240)="584653420000109daa47c2928c0362118f0cdbca29fb8226106a52ef796b7d00000000000000108e0000000000004b93106505000000000000000000000000984f0b5042b64b06bc86cb0600000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034910200110000100700000000", 0x55}], 0x0, 0x0) 08:45:49 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x32, 0xe000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r1, &(0x7f0000000040)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80) 08:45:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs|', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xdf\x00', 0x43732e5398416f17}) 08:45:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) semget$private(0x0, 0xfffffffffffffffb, 0x80000000000010) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x6, 0x20000) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000180)=0x4, 0x4) 08:45:49 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/194, 0xc2}], 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)=""/210, 0xd2}, {&(0x7f0000000180)=""/63, 0x3f}], 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:45:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 464.475968][T18898] UBIFS error (pid: 18898): cannot open "./file0", error -22 [ 464.477861][T18887] XFS (loop0): SB sanity check failed 08:45:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe0\x00', 0x43732e5398416f17}) 08:45:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696c65548cd3e109ba1e0befc48fa226d819df3000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 464.512357][T18898] UBIFS error (pid: 18898): cannot open "./file0", error -22 [ 464.587032][T18887] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 464.639149][T18887] XFS (loop0): Unmount and run xfs_repair [ 464.645243][T18887] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 464.681549][T18887] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 464.702753][T18887] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 464.788036][T18887] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 464.822050][T19019] UBIFS error (pid: 19019): cannot open "./fileTŒÓá º ïÄ¢&Øß0", error -22 [ 464.852499][T18887] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 464.885730][T18887] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 464.932885][T18887] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 464.961918][T18887] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 464.988935][T18887] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 465.026893][T18887] XFS (loop0): SB validate failed with error -117. 08:45:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200", 0x68}], 0x0, 0x0) 08:45:50 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1f, 0x3) write$P9_ROPEN(r0, &(0x7f0000000180)={0x18, 0x71, 0x1, {{0x0, 0x3, 0x3}, 0x6}}, 0x18) 08:45:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66696c100000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe1\x00', 0x43732e5398416f17}) [ 465.407892][T19049] UBIFS error (pid: 19049): cannot open "./fil", error -22 08:45:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xa5, 0x2, 0x63a, "c1dc22fc285e4ba0328082b6ec2e3004", "4a1bee10f9ae3c67d08b0510b611221a77cc3f717e637afb2b7a283c526e3a77649ae52dda576ad9887aaaea3e151be738f9c9a5634a649da68394b653bcea697e3cc314e9a9ecfc6a5f3825f553e680e693f7f215b7035afd8dd975d8ee9de0cb521dfa60469763e3cf70a2f2a991f413374fe5ae2de52ea4158888efee1c27903de2e83a2f911d83e812f6f8734b6b"}, 0xa5, 0x1) 08:45:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:50 executing program 4: prctl$PR_GET_SECCOMP(0x15) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400000, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x1, 0x80000001, 0x4, 0x1, 0x0, 0x5, 0x8150, 0x2, 0x5, 0x4, 0x1, 0x1000, 0x10001, 0x7ff, 0x71, 0x4, 0x2, 0x1, 0x10001, 0x9, 0x3, 0x1, 0x80, 0x7, 0x0, 0x3, 0x8d, 0xe6e, 0x10000, 0x2, 0x3, 0x3, 0x5, 0x98a, 0x6, 0x3, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x101, 0xfffffffeffffffff, 0x0, 0x2, 0xffffffff, 0x7}, r0, 0xa, r0, 0x4) [ 465.623028][T19155] UBIFS error (pid: 19155): cannot open "./file0", error -22 08:45:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe2\x00', 0x43732e5398416f17}) 08:45:51 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x400) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x81, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x117, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0x2}}, 0x10) [ 465.713507][T19155] UBIFS error (pid: 19155): cannot open "./file0", error -22 [ 465.730285][T19150] XFS (loop0): SB sanity check failed [ 465.781011][T19150] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 465.818981][T19150] XFS (loop0): Unmount and run xfs_repair 08:45:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 465.909335][T19150] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 465.916776][T19150] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 465.948364][T19150] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 465.968382][T19150] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 465.977887][T19150] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 465.986921][T19150] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 466.006556][T19150] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 466.077828][T19150] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 466.116146][T19150] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 466.152068][T19150] XFS (loop0): SB validate failed with error -117. 08:45:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 08:45:51 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0xfffffffff7fd7d2c, 0x1) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:51 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r0, 0xfffffffffffffffb) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00@\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe3\x00', 0x43732e5398416f17}) 08:45:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf2', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 466.493428][T19303] UBIFS error (pid: 19303): cannot open "(null)", error -22 08:45:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) 08:45:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:51 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d, 0xfffffffffffffffd}], 0x0, 0x0) 08:45:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 466.774758][T19392] XFS (loop0): device supports 512 byte sectors (not 0) [ 466.794638][T19422] UBIFS error (pid: 19422): cannot open "./file0", error -22 08:45:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="0180000000000000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe4\x00', 0x43732e5398416f17}) [ 467.069708][T19527] UBIFS error (pid: 19527): cannot open "€", error -22 08:45:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 08:45:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:52 executing program 4: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000240)="3a46ab0d858850699344ded293cb7ca2a15904ca2303da659cd6bda48c3ae7a20a8afc924e6f847e2126df487f21f6cb4bcbe11d2d09bd80b07fdbe484cca231f1cfa1d9d4c16ab0fba3b53f7b8b57d5d94ba7201e68ab61cb62b57c3f5bcc4653c000f577e00d09fd3f2441704436386d650d2501eef6d06bdda4381f1a7af173f9e67a58c29ae911ae62f743f6fa46e3e472283543a650b4c6a908e93df78791e0d00e3eca8a9db4505f151e9faf8453ac078d313ad737bff0f1f9fe451a184137fe5b39a7993244995a", 0xcb, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0xa5, r1) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x20002) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0xa887, 0x4) [ 467.335576][T19567] UBIFS error (pid: 19567): cannot open "./file0", error -22 [ 467.356492][T19567] UBIFS error (pid: 19567): cannot open "./file0", error -22 08:45:52 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x800, 0x40) ioctl$RTC_UIE_OFF(r0, 0x7004) 08:45:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsF', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2faeff7b542615"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xf1, 0x200000) recvfrom$unix(r0, &(0x7f0000000080)=""/173, 0xad, 0x10103, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 08:45:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\xff\xff\xff\xe4\x00', 0x43732e5398416f17}) [ 467.474572][T19651] XFS (loop0): device supports 512 byte sectors (not 0) [ 467.625488][T19679] UBIFS error (pid: 19679): cannot open "./®ÿ{T&", error -22 [ 467.667394][T19679] UBIFS error (pid: 19679): cannot open "./®ÿ{T&", error -22 08:45:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) process_vm_readv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/49, 0x31}, {&(0x7f00000012c0)=""/235, 0xeb}, {&(0x7f00000000c0)=""/44, 0x2c}, {&(0x7f00000013c0)=""/215, 0xd7}], 0x5, &(0x7f0000001a80)=[{&(0x7f00000014c0)=""/206, 0xce}, {&(0x7f00000001c0)=""/81, 0x51}, {&(0x7f00000015c0)=""/211, 0xd3}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/107, 0x6b}, {&(0x7f0000001800)=""/214, 0xd6}, {&(0x7f0000001900)=""/173, 0xad}, {&(0x7f00000019c0)=""/165, 0xa5}], 0x8, 0x0) 08:45:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsN', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034", 0x65}], 0x0, 0x0) 08:45:53 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0x101000) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000240)=""/4096) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) 08:45:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 467.881276][T19796] UBIFS error (pid: 19796): cannot open "./file0", error -22 [ 467.892786][T19796] UBIFS error (pid: 19796): cannot open "./file0", error -22 08:45:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="372f66696c653000279fc1f2dffc1e595617b53f9c7c03daaaff3218cd68c946c23ee1d6937a3d5081895734daa1121c08cb2944de25da03cfc94397a501750bf2c2546851c70525631e8f6f1d47cfa6304ab3b972dfd74e094844c056ed4766b222cff6cc35f6800045af3dd82aa61e9784aa6167f37438db2ee12a96d02cceba981605a6486338fb62d8c24a89af791deed019690ce4be1ce5796652eac79100000000000000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$ax25_int(r1, 0x101, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$P9_RREADLINK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1070000000000000000000005677da88729eaf5798000000"], 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xac, r2, 0x200, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}]}, 0xac}}, 0x4000) 08:45:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe5\x00', 0x43732e5398416f17}) [ 468.164075][T19820] UBIFS error (pid: 19820): cannot open "7/file0", error -22 08:45:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5007e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e00d9b95873300062073af84bee"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10001, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) 08:45:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 468.231415][T19820] UBIFS error (pid: 19820): cannot open "7/file0", error -22 [ 468.282292][T19815] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:53 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000500)='./file0\x00', 0x402, 0x10) readv(r0, &(0x7f0000000780)=[{&(0x7f0000000540)=""/70, 0x46}, {&(0x7f00000005c0)=""/121, 0x79}, {&(0x7f0000000640)=""/17, 0x11}, {&(0x7f0000000680)=""/220, 0xdc}], 0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x400000, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000280)={0x0, 0x80000, 0xffffffffffffff9c}) r5 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000300)=0xe, 0x80800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r7 = socket$caif_stream(0x25, 0x1, 0x2) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x0, 0x0) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ppoll(&(0x7f0000000400)=[{r1, 0x581}, {r2, 0x4}, {r3, 0x2}, {r4, 0xb0}, {r5, 0x8000}, {r6, 0x100}, {r7, 0x9100}, {r8, 0x20}, {r9, 0x4}], 0x9, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0)={0x2000000}, 0x8) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 468.527140][T19941] UBIFS error (pid: 19941): cannot open ".", error -22 [ 468.546802][T19941] UBIFS error (pid: 19941): cannot open ".", error -22 08:45:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402", 0x67}], 0x0, 0x0) 08:45:53 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66696565f025"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x10000, 0x400, {"55ab8798c542943eee114a989e4312c6"}, 0x1, 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) 08:45:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xca', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe6\x00', 0x43732e5398416f17}) 08:45:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:54 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40001, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000600)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x268, r1, 0x30c, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3a78}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x18b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5e67}]}, @TIPC_NLA_LINK={0x170, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x17b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7af1}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff0000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xba4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffc4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400000008}]}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0xffffffff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xf5, @dev={0xfe, 0x80, [], 0x25}, 0x3}}}}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x800}, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000016c0)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000240)="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", 0xfffffffffffffe5f}], 0x1000008, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000640)='trusted.overlay.upper\x00', &(0x7f0000000680)={0x0, 0xfb, 0x1015, 0x4, 0xffffffffffffffe1, "4ab000510796babd302435754de0d966", "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"}, 0x1015, 0x2) [ 468.929074][T20060] XFS (loop0): SB sanity check failed [ 468.935061][T20060] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:54 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002780)='/dev/zero\x00', 0x4, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002640)={0x0, 0xffffffffffffffff, 0xb0, 0x2, @buffer={0x0, 0x36, &(0x7f00000024c0)=""/54}, &(0x7f0000002500)="488a0d98fa5a2e335d0b6f1da42557376570f0a6507585625ac1aee2e7b67554a7887aebe00348a9d0ccff6159e1e2d054aef377139f2354d4ca0b60c263cfe9d5bab15d38fec5df0b732cded941b738f964c9ec03e7d29d2551c19b9b8161b162753d9449ce96155c4d644985ce46181c0a11495d1d4d9b6cfbd4e7c30ee93b1003f15b12cfcda560bbec448ba1d8052674f7702c751a04c667e56fe3ddc397d49376fda0ab9f7a7d3c5386639005d2", &(0x7f00000025c0)=""/48, 0x1000, 0x22, 0x0, &(0x7f0000002600)}) sendmmsg$nfc_llcp(r0, &(0x7f0000002340)=[{&(0x7f0000000100)={0x27, 0x0, 0x2, 0x7, 0x7fffffff, 0x3, "ed756d4e4e744c6b46f7690036b1819ebe71ad55857db0105f24ecdb08feece5406f3d180659872ae00d5b6e5df99a6bf85d93345c875c741697ec6721eb36", 0x5}, 0x60, &(0x7f00000003c0)=[{&(0x7f00000002c0)="3bbcee08a08cc84d88545aa3d297a256885a3f568b6cac1d219389e9486f8d8cc80b07adaf5c4315b6dbac5ef5f0f4056f24ebe3d28bf64f05d133ab0536d55738dc0be14cb1a13274417ac8ef151d9a39d3e105ec8e5379cd08f0f3837d4f8ad68741ac5de9b3dc54760fa070b251c8264f9cdbf1153296e426d999230a66d201a6dd409b5009649b596d8aee7048ffa8537df5fa0e01d1be496441063a1a89dc4b84413f25f6a180d457e3fda089cf1e1ab436c39e957db8d387df606e4ff2d23f2e4c22f82ffb7e39294ff6994eadc24aac9859c0a2b0ab4a1913700f5a129a4c3a2b653dd229c80bdef76c18b3fa1c140a232ec24a", 0xf7}, {&(0x7f00000001c0)="da85be29e75ab6dc1ab6abd27c6e28ed22a56970fc2d320208dd9aa804fd7eca169edba4b5ccfde191b11381badb9b562cadbd9291db965586d3fd51f99b46d4607a94bd", 0x44}], 0x2, &(0x7f0000000400)={0x1010, 0x0, 0xffffffff, "af0adc7c2044f7fd1a3a7cf227e6e6c95eb0d3bea18c8716e4c303eb91eea9a2cea6088e8fcf0953c960407b89c06fd35a939c4badb0dc71c993fa6bf418db79604ff86abb7e893fa383308ef775e5f20cce00367d3156a78473f7e68d39f5684dee7d3c362e510008b1b63683382d133f3d146309a616accd2cb85bd3f3eaf921043478ccaf1cb6ca036e394e44052ac202f5fbb4f03ddd023580b5c56f542271484e8a0ef6d8beab1f2666d22b5b6a95dd42e1ea5beef7fb150616c2b0bb71ff4ad2aece45a3528805f947c9d96fe48ba5a0217dcbf073b5331f25b50edeef0279e3a2a1b13d50cec91adb42057b63881c1a8c2b468eb219085ad855105c6b4de2b5a98a8f3f880aae142cc68f61f80c4930d4b7dd33009ea603ca7a7b408a9cf5532947fbcbdda25070200d257893eb3e3394569ad6b70326a35632646ccdc94a88a1bad29bbf4355894a70c54c877e97244fa297896a8c5425620338efaee121ec9b7050125c9413c670b39529e9ecca3d0712be70fd5ef264928af947ce84f18fdc895942f29ee25f4e3ff9cc831d2c6a067a738c5d521b0cd2d4a8b28f18324bf4a3076d32d8103652740ed49529ac63d867597a19fdd116c8e7a7833f67356711ff041025bb99aa83ce96389ad26d9ac5800d74f0748034f5c50203bfdb24f34de4c77889cd75d5d0d00027f25f12d4f53ceeeb68b60b9c44a44de373d0a1cf15a94051b1e1db52d1b29aeae12a77c9105f67a9f633dc2a8355b3b106627c455d06b9e5109a46ab01484592df6540ab1f27288c7df1240b4bbc635226507dcf0e2aac20aab4541f3e9c07c5e761879e74acb08799cf4876222e0b6cfb915b1345939a95a3a508474c48e9024e5fb5df8d27f766f72098ff585f5c37f890f459ccd61b12395e9f6eed52f9cca262203c3c8d66ca0b85984e53671b722cd31596258403b22fe082aa0448ba9abe5e1969c825faaff2a5cff6c48b6a762283a6e89a07b95a82cab307990014bbc27c7b9870b716b1dd5173f57d76b890599e07e667749cc43ef3e2b98339ca2dc5c1d01fa73e21a57abf4d2b9b3f2422993bad9de3eb15ac9688dc726e6f00b778511282b97097384dc7e7f115826d0ce92cfd25985503b931fb2d23f35cc4983dac029ec229f62d9a44ba6c610f2734945948e34dd064795b460b004e5138c6da426b0afb55b95f3ab20f2d754ef87212c917302903eb399147e4753db28f037844c22fcb22c79a334aa8d2c2c789739e43b2df2788f3d5084890b90c7dd8f02337c389af67add3156001f5a051bfc695eceac2f70e29260e600ee3be19b3a2f1c4f86539bd0e6d3f8405e5ad3c38687cdf4ab5d919385643066c3fa959b55362edc1adfb5877b7b9752f46919248e33fb40c5722cafa084fc0b0c23577433cad85080d60da01fa175affb58e2beb5a46f70dc4c3afac547d8af5a0a0aa14ba4b459e86043c662faa689ea55915f33f1eaeb82382be81bcf3e7726bbfabba07df57c6c2a5a6c9f32db22f22e9f6608374629f50838aa280fa0f1a8b3c61361994a72e3e1f3bbccd2f66e350a49b34ab977b1181b33ca76b401605e0e00f38d99c8a93279090ade16d6e7267cbf1649566f58a20368407d7357af6a91b085a68d9dfefd1064f1570c62c53dc756fd0fe40a106d2b45c8857876a7f3f91a717a7281c8b5f6ea795c2f657d73111ca85af344cd73df9d453b11247cc512d973f86c731bfd7dcd17f2f77db05c59f0691aee357468d84176bb01558e31c998b5fea455ff148e48894068ee80e042951e97010c31c2e92648d31da990403fe48c6aab86060d6e9bd5e9ffa4c81ba2c0a20363ef12e388dbe97e9f95e6f38a56ed0b5bc9a4729db986f5e0e67dcf0e2783c14a6e63e2d37426a08e6106cb35cb42325454482478fa5301c3f483bb5cb6183cf544144112a35e853560cd951bfa453acfca9fecaf14b74f43228081a634d1b220599af2c7d9349dfdc9a9165c48f89a14169944c492db2a11cf0e657b9433deec222c23ca26bc970b7d22da12ead36aa40acab02286dbbc20a9798f58e8a1a2a70404db46259e1270adacd14e3a0cefef3f67ca360c06f87fcbb1a8e19b70bdeca7910e660d0a688770894114377f7b4e5a7e0f6f432ea8011164d836e5951f5d73021e8560daea3679ccccd1eddf3db34082855eca0d1ccb6e07eb14036b1428902153aef2114a1a5668c2b13e25e8323ff9f2a910475505e29a501caee510f6ac8f169f3d6a1bf1fbe29116725b5e99aaff49f08383c8162e6c6fadf480e6a1d520945f63bf9ada735e9db5fdf1cce15f3c8494d906492bbf4b13267b3e4725bb4cd8088730767dba493c8c61d55fb7acc5c54d2478677910cbd7b5c2413fe03e1b917d7ebadacb1367b23b8f05dd195f060e2775e38f9d79a22d13d6258cd26512d5f3ecfd9fcd90f787804c663b7b40468dd440f3b4e957d419806473634f37e16b2276798a401f26536977320e4bdb94b173675406db5cbe50a8113753755ec7a94527c8972ea9056df2a86007a12628f8f90ecd0a5fa3ecedd97a48c28280c4622293f52e4148232ac497fbd787449daf10b6f518c7daa2c2b32a59041da698c2341fcb58aa841453e8c2ad8976f5b11d6f288dc2fa72ec353625196c5adb6dd8603956a171b67e9c443a5f2c6ca7e29f30354daf4fa28ef15e680155ac0442c5507e5795ef02a2d57a13769a10ca2dda919f8d115ceb89476410231fbe1b8fa93963d4f6d88fdc0192f7f4a5842852949bc0708edf5edec46853cc0b213da018b175fb28f05b0ece276910f5477251c1faab2c40c24e12adbc520e969506331e5718eef18e927e206278fe9779d87ca60dfda09b494e8491e79d462e20680f6ed82ffe6f83fe26c13b7b8bdb5e301eea2020d3f94098286e46945b071bb5f17f2e97113db7fc753b27e65a2801fa4afa6e298c64ea02e114c64545d88f285303ac1b1f8c89412bc6fa2295a76e8ba5f81552c7cc6a0f6c4b497de1fb0c8904367e4a12b44cc73fbe230562ccbced50bca26d56220f79a182afbf4e87cc9dfb8181518f67f5a875303f8440339595f6fbd5a7c35d887952cf846f247d36afe0cd180bab7f1d4f8cafc9bf6eccbaad55802cbd3bfb2534ef89f623dea68ab4ccb1f84b6b5af22dec94b25a10bd5a5db234f1b7cf26d84b7e353955b036a0945a5a592b21aa0b0b8aaf0f91b1b6336adb8032df7058024a7a23e2b3b8eec59579fa24c8d86bbea100c020ed6a5f8d267636e4cbbf9be9262b4aa750f86e40711602d72db0a18a382fb8aaacdfc6476233d5c0224bfa958c16059fab49995fe3656d70e7a3dc8410565a8c084381b423d9c66b0021ead93791c3d821860b062634fb2fddf9e6757f7d6ef3a985932125720d354b44626839a519286bd7f54d714f8350978b976a32a4761a9b96d5cc6a3d0c48766a4742a86b285a88985dea2e583b1b90f06de19cdd4b9221e8ab62e7bd5ff595ce95f1f984b2d4d32bc9982885b5b9836eada193c133b445404b4e6d53fce745fabafd811f3afcc3bfbcb1ad1312a3495dae398b10f848bfefc100de7efbe9d64c8e958452eebf32b16fd1c30404f407d648d7ee4c0d1be7594d17282a05ca9547a7ca8d656913fce88b9d2d4f27aceff4afe6e7e452b3b8564fe0923300bdf37e72fface5dc0ab93374dc8a709aeeaf13ca9d03bc787e9e32c371dc99636b2172fd2b08b24de7d22663e9c382b1e6696fa5e90008cd4f640ce44b1510652c03d73a8eadddb3f35eb09149229490a446790c6eed64ccff7283e9ef887badaced0c65aa5b576abb607415fe2f6de92767f2f3887e6f655af02ff6e990266d8dd36d6a7d5de826c9742ce524771e2b9a085a1b5d31a7a7c8479fd8a6f8e528230fa56e27532660f2f2dd1ce939fed55e76bde05362b15ebf4cf74542b8a8f8ba76a6d6279c5a95577d2d2670f19b86f7855559ce12241cae2dff7c1d374330c22002fb7dc7684230fa8de401d3da225135e049c5a71227c324aa42e94f5230df7c06cceb651d1db863ff06e43afc8c2bef9d798e7a5be56dbc7f76dfa80aa36a6f0716150737af2c377d0858ebd6be3c439d219e2bc8d33b5231a39a5ffa778d960548dc145aa02e37c24d556127e782dca56172ae568860d314f7f37cf854c2f0411e8874e30468491be3cd44f5fc8550b99085f0a5d362fee23839d7e5d8e95952dc3b2a424786e10b361d2e8b464b87c9e2d9fabcebd04f174e1aa6845376ee7ac244f24ad003a03cdd59f67c35cfaea71f90cbc9410c89d8a9771646475bb8be0098ce9b1bd7479ad163aae3b489aae48872f4d7ecb74018900e2e41812cc61b574352d4f8ffc9e79794a2ed0cb420ddb49f4efb1c877145dc4155d0c1684be0edcae4d21eeb72d16bfffc62058a3d2a3057fc5d65dda834ffd55336e662686e22fde1690b281f2c4149e3acfebb30a7ef04611443868574842082f1915383eb57bf0384ecd023ddced0d987a7577235ec30c0670e688487a2ef8861e5db015f951e587a6131a447e1727407e703d6cade1234fd6192ab0c8dc066b8611e084dd4a9384e9db59962dbfbcc99cc42590f3bec33f781ab83c5564b2d83a74a22b24880b7aeb03a80e05060bf4738a9ffead9afa9cf4a52878a2c65c5941912dc14416af83674a180afc6c8d50f6daf4ebc467ef833f61c074e84619a087197f71561d65b2ba160d4253d172c59db9976d17888fafaad408f929e8079db101c698ef507b5bfee1f648e2f06402b2f38263c44408c33915be2b82414a8f51c7c211341dca281a4d2facea5e170da2e7bb7c22c45220e0729278b49788d246f2ebe3c25a66ca3454e146976680aa542d743cdb0fed12b48017a76b70e330a57135e4f11515dee2f62578b6bedec149dc5787aee1f6a4de82da11b17898d1772460afcdfd549d419991fa365799724f4a4ab39ebf0621b79efe74cfd3bf63417524791db5036e415c97dd11ab773151683ff8434e6e7300f834f88e3dd69140a28fb0e635e92be37836e7b57716bc22979dc6c9a4210cba97393c8d9aeaebde8c6f22ae770c14fbad7173d6bb2fce053f951d9ef5c9336fbe078224fd3ab8fc0ba1439166ad3cb0e4d7d6cec84fcaf9abeb3792fc0d106cc77e80df5454c8776e7f626c512eba81ae8f6b42bcf085d8ec750b98646a48f48e4eb9adcc43301f6e4970f058f1a2afdd110bf2fec6599e88ffc62cb74a1893ac683e0bacc38cc1d8eb82198a5d0e016cae2e666b3603884943d9e971daeb3bbc7974760cf14c2770623ab78cf7875660759f2550b368bd2b2fdf9f140f99d6aaf1da3d3e86b3878788ff2f8ef855eeb9dcda62dc6b39d8b999833d2abc7354caa5120c0a31958e017e384929d614871a3cb30fb57d54017d0e3c920984bf450d29ffc3bce29ccd031b7a105c280ae8142d66fc4a6387af031c63e071b6842fb4e9c6d889936a43a76bbaa5a96fb43617cd0c882ff1ad429b0a4fde8c03a2e2d95d799d2b22915c266d304e4180745a84d17bed6da44ba26c5943ca5bd46d1b422378b25b5d779e575dcc29fd16245e02d1a28b1f91e1eab7dc60f980079b76b8d73af3f99b775a6421ef17a81248fa89f54a2f70af767f433bb0c7224d9724bf973170b0fb88cb4a5a77f6b49af5396b6963d38e1a9433e3ec85fe09add8fae8d92936ae22fa5aa80ef23906de43eeb8f18840bde9dbe0fbc4640f1ca1add50560484b450d11aa0e9d8b9853089e6979435cd0eacb"}, 0x1010, 0x20000000}, {&(0x7f0000001440)={0x27, 0x1, 0x2, 0x0, 0xffffffffffffffb0, 0x8001, "b6b93a177ee0a9e689fc3abbaea5fdd37d3a18e3dff7e1c692fb714fbae4d382a0ae09141d70ad6b0f5b495ec13250d14bf084c7b7e61b18c013f0b3e74529", 0x3e}, 0x60, &(0x7f0000001800)=[{&(0x7f00000014c0)="15d85882d7128e07bbd770d01a8cb6f933e22962b73474fcc1f23185e36584f6a0c5d88ded8bfb6dc7a6bdb7804d8ea50343c49523469bb3ec24b87f10790ad49f833826e4fea6a701f5ddcf46b32bdaed6036d3744156f2dc61fd8f848824", 0x5f}, {&(0x7f0000001540)="bf3a027c53dcddefab5cb50bf4cb28fc08c0825a6f3ba9", 0x17}, {&(0x7f0000001580)="ef57f7fc35044aaab3cb7edeee6c2ba31a8434c7b48248955aeee887fc733e435be3eeba68c236f3ebd4203fb911c724150c01523edf104420a841ccf049807d704ab1469edd0fb6ba7018e648336c6c9985c1ebd9a6f4865e9657ba64d45734c286d89f05a3e549e551bbead7df28a48b", 0x71}, {&(0x7f0000001600)="10c7b3c3af5e0eddfa0887fcf4441883cfd350b5484474fc93fd7a364f3afa", 0x1f}, {&(0x7f0000001640)="5f0886f4756f79715c9f8503528e82c64c6c0a22ee1aa630a7689db1720d2692731a29f7dadaf9ca499f90dec72cd125d520bb9076eaf56c991303e1f4f74243cfdb933d427103d562f811692cde364ad8d52ad20d7ff0f2865b91562aaf36c1f8a9f1dedc4c5de48b22158c46e8c4c4746225a44a86e4bccc", 0x79}, {&(0x7f00000016c0)="a1266ce47ac9eeef7b45013c034f62b1b5a478af0a14e0b466df3c966978aec447c14882566ad6d7591e4966eac10dee36370161da6aed2f9a7bd3ce8d6f3662d3f10488b8efb27ed42702e9e14272facd0c30e6b79f95fc22ef0d6d72c1ad05e2a989d11e562f6e7ed52aa595c006b7d84bc797bc2c25dc3a49c4a1cee1d3fda46fe0fd0638cefffeaf1412dd231dd8373578571e5ddc032e8d5359693d6517fec4de3dab20efabd1f72ec3a154d3ad0cbc6ce7c4c3ec75e75ea2b1b064b750f1b8e0b96afe1aa8c74b5944a8a5a7c4410acf9bc6a6ed2245fd4873a67c85c8625fc060", 0xe4}, {&(0x7f00000017c0)="9fcece7121776ac1164d", 0xa}], 0x7, 0x0, 0x0, 0x4000801}, {&(0x7f0000001880)={0x27, 0x1, 0x0, 0x6, 0x26, 0x4, "967d3ade0b49038e8ca204af827f5536a742413925ee00d3db77d907bd59e62ab4360ef5c39fcc01b95e3409215cc55c6a44fff1407dc62d5e08f54e336cbb", 0x14}, 0x60, &(0x7f0000001b40)=[{&(0x7f0000001900)="7c128e7e841e634cb1cda49bbf4b6bc0c4092a4fae37e6f1caabcd080a172ad8dbddd467a92a93451f3f2c8543434cefb4c0a8e6e546e2807e77a8dec310db6dde7df433be9361aa8d2bc43eb60467c3869172aa95a9d757682c3ef2cc1d831faa7422fb52e26729aea5a9d0d4c08c316eb2438ea55b49d37b", 0x79}, {&(0x7f0000001980)="82ea832ea34c9a6291be6ea5122b80d856e5260dcdb8b1f8ba74ff1889141b3424735de92979dd0fc7466d3db92dea38d0046f00a915271faa4da343af3fbe86fcfc8479809e9c0a079a539cd61db22f6cc2eddc84ad5162b59734c894b7442a831238d1b1ae37c377111b9917d82c13e97e22a96c46010fe24e01cb0a3c626853cbed6f17215b37765eff967defad7c4a3a31998d5dc7f55ec0b5ccc55f92ec5d", 0xa1}, {&(0x7f0000001a40)="2a9be0846df79ed0b2d79903400b780443c90c6fe37cf920b456a1ff7648cc05df663e7d0de730c4c2f07176eaf4f7930d74791622cc00d46b3b30a7e740d58519b5fff07fc04e6c186fe4163d94b4404bd0505d441784360b82a24d3fb4be92693cb2413eb96d27f798d016d7fa42a28b7f50c9efe418d8e278427e9c3422d12dbc6382f0e838a06d5dc128f0905a21ac16eec56e69f71ea1717edbf0b0bdd9ffc3bdef6b04924be95704ff90cc974b206ec1e1084f0ef9195ce6158e2c229b6b", 0xc1}], 0x3, &(0x7f0000001b80)={0x98, 0x117, 0x81, "b7e69c84666a2bb8a6877c5f5d15067c40150759458deb3da89c411ca9fd71f8cee0b7f2b4b03c0be0807d391f4fe9b318e3936e379ff9dbbac5336e63360f8b1a10c594ba7bec61707fd9536275149a61082576b3e26e3a9e7a8300086c96ff729a979c40a015bdbf899733f8796d73a59bf3fe348619b1a210d7eff253009a8f4404ad2866b119"}, 0x98, 0x84}, {&(0x7f0000001c40)={0x27, 0x0, 0x2, 0x0, 0x5, 0x8001, "67211f7fb20f5c518fa603a6b7f98204f7a8629f67f92bc740a0cdab508e4574b00595cf1140a7d693a6c34a41529c7de12c8c4252634ab5d80d42c8f886ea", 0x39}, 0x60, &(0x7f0000001d80)=[{&(0x7f0000001cc0)="353cfbb53af0531d870694304043c14e8af20553e24a0195f663cad4a7e4e590bf4c63cc16af916834b2a7e9d19b7d67233e182e77f2976aeabe8d074d132993afeafc0c2b6e606a4549066c678e92fff0b6809c08c13a52d43ca6d615043a9d93c3d1851e80e1621808c5b5ae797600e2d7ccf5dcae20cdd10dfa3f3792ac6c05e16e2912fbd16c9051beea52de1134fc35f7c1152b366fc9", 0x99}], 0x1, &(0x7f0000001dc0)={0x70, 0xff, 0xa99, "298f1b7781f711fa18377e2e5d9283d9918f3080b8e5fcdc111661881e4575969996d5db5c25fae1334e9e39588a115d6290e6b97a34580fb1c28d23fab5fcd5e62c55582b0d9f28669880075a0f4b683f83901db7dccfa513"}, 0x70, 0x50}, {&(0x7f0000001e40)={0x27, 0x0, 0x0, 0x2, 0x0, 0x9, "767b825f758e61ef5a64cdc1f34956636cb0fd21a515734f57a0b73934baf28267b30ab0799760584cf30d9b00666f0fa83e171fa797fdad8a7771bf199ae4", 0x32}, 0x60, &(0x7f0000001f40)=[{&(0x7f0000001ec0)="a7d18ebb8cb6fdf0d9d8015e95e8bb5d96b0f25615b81c8cd53eedaa8ed7c086be374b18132aa5243057dd2bde65dbc8f0b7c60da344a25f6c07", 0x3a}, {&(0x7f0000001f00)="fb0484ed9228a8e4ca054a2c0e40cfb87fa043fde5bc958c7d193febc45d041e702dd0d19575a48573450fdaf692ea108997cb5bf50ec70bb82340f2", 0x3c}], 0x2, &(0x7f0000001f80)={0x60, 0x118, 0x0, "3d87a0f0f6908bd21c0de1b42cb5cf83d6304c290cabcc625d8bd70bb257a37c6f1ca70782e94fd5066df7e011c75f527e50619bd669c6e90713b0cc3e306d9f58f012bcef33640b5e7230"}, 0x60, 0x4000054}, {&(0x7f0000002000)={0x27, 0x1, 0x0, 0x0, 0x1, 0x3, "25ffa44ba3f3510ffbb484b41fa7b102dae86f53973a91ec26559d3aa00f4fb6734c4b0361bdef8893c6ca9b6247674c6fbe39f734ba4c30851579954d8d0b", 0x3c}, 0x60, &(0x7f0000002300)=[{&(0x7f0000002080)="e1355846580d94fb23fc74c886821038aa5a03966345788ed6d04b8f2131d08865f8ab5e32966f54e634c7727dd2f07e2810082822118b55b338edf16357a1da56b5aed31ffc07ee1a01076529891fd4b67f85d085fd263f9a966340e5fcac28583624c6c99c0dae7a879f2ea5f3edbc57c49753808d867e3025c75ee56f9c43d33d37c14086ccef9af3607b244c97fa6a4672887d501a7e35b6a42f3af28ac8892d4800901d2b17bd623d2ab671", 0xae}, {&(0x7f0000002140)="59325eec8a63bb8a7f7e8ca6fad7f2e3a6b9da558d1876bdc17ab8bcb254fca3ec795ea35e5fead5f6af204d16af02086203980cd7b8fc00826205fbe21e6b529c7b213ef125ed01e434e391de626ca3e88e72ba8454022bc1d9f3c3eb209b20a14ef22ab99f7aabc421346f5d594bdf7ce9be2319436867afd1a9250aed2e1e16ea0274ebb2fb29242272015592763c5f5b213b4db6af860a1618cfc8326acb0e7bbc77649f675a214e37a1258da3c248a82db44f02716ca8d732f8649def263ef2ba5247b54c993ee4a34d1621be", 0xcf}, {&(0x7f0000002240)="3cd9f4d2955826b8b26f6f06679fc84cfecdf9a90de1d5e77ad1865c4f48d5dabec605f10a74c541774b47d33ff53efccbd7c0695524682f9f", 0x39}, {&(0x7f0000002280)="e70826fdaecd08326a3d73ce549313f2b803aa050c58a6eeb34d268764bfcf62203bd45a18b794701bda085bbb7ec047b13e69cbba2ca38dc02adfcf955dc094bfc1e1e2f2a429fa", 0x48}], 0x4, 0x0, 0x0, 0x10}], 0x6, 0x4000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x28000) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xcc', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 468.999498][T20060] XFS (loop0): Unmount and run xfs_repair 08:45:54 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 469.053118][T20060] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:45:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe7\x00', 0x43732e5398416f17}) 08:45:54 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x7f, 0x80) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000180)={0x8, 0x5}) [ 469.185640][T20060] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 469.219226][T20176] UBIFS error (pid: 20176): cannot open "./file0", error -22 [ 469.251576][T20185] UBIFS error (pid: 20185): cannot open "./file0", error -22 [ 469.281459][T20060] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 469.322995][T20060] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 08:45:54 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f00000000c0)={0x6, 0x0, [{0x8000000f, 0x1, 0x1, 0xecb2, 0x10001}, {0xc000000f, 0x0, 0x8, 0x8, 0x5}, {0x80000007, 0x80000000, 0x7, 0x7, 0x8000}, {0x80000000, 0x7ff, 0xfff, 0x6f60, 0x4}, {0x1, 0xfffffffffffff1a3, 0x1, 0xfff, 0x1}, {0x7, 0x9, 0x4, 0x6, 0x29bb}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @default}, [@remote, @default, @remote, @default, @remote, @bcast, @default, @rose]}, &(0x7f0000000380)=0xfc) [ 469.369145][T20060] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 469.404653][T20060] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 469.415896][T20060] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 469.445824][T20060] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 469.497542][T20060] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 469.553577][T20060] XFS (loop0): SB validate failed with error -117. [ 469.590926][T20301] QAT: Invalid ioctl [ 469.628535][T20301] UBIFS error (pid: 20301): cannot open "./file0", error -22 [ 469.635743][T20301] QAT: Invalid ioctl [ 469.667405][T20303] UBIFS error (pid: 20303): cannot open "./file0", error -22 08:45:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 08:45:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:55 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000180)='syz1\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0xfffffffffffffe74, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x03\xe8\x00', 0x43732e5398416f17}) 08:45:55 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xff, 0x101000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0xe9, "1d7e1788d5e7dbf8555feb8920dcbea5ec4e0a2818f3e3c18495fef71eb9f3dc4e1cdacfe34bca465d50ec9c3090a8103abe366e462cc32419f70aeb8f7edbdf10d2695818f0199ba03b4937cd8e66cb0e576ce7448f71425bbb9dbf78d24daaa36d907c2c95c0f2ea723b144b5c2ca4e9b71852f984500b5df5b260380edc5c501b38bf6dd41f315ca011ce32db8e93c993e33b826e878e969f686c726fc77814cf68078d2618a9b9b36ad424dd217ffd0321a24129b7bb94b726a265c2526c27b6442aae340e28fe415f999e2c648d2075e147a2281022e67f5f713a6a7b4daebe9812a2ba278c25"}, &(0x7f0000000140)=0xf1) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e20, 0x6, @ipv4={[], [], @loopback}, 0x7}}, [0x6, 0x5, 0xffffffffffffffd7, 0x2, 0x8, 0xff, 0xd8cf, 0x9, 0xb5fc, 0x8, 0x13, 0x66430, 0x101, 0x8000000000000000, 0x9]}, &(0x7f00000001c0)=0x100) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)={0xa, {0x6, 0x0, 0x8198, 0x6}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='./filu0\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000200)={0x6, 'syz0\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) [ 469.983374][T20322] UBIFS error (pid: 20322): cannot open "./filu0", error -22 [ 469.988383][T20378] UBIFS error (pid: 20378): cannot open "./filu0", error -22 08:45:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='./fil\x00\x00\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:55 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x6) accept4$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14, 0x800) connect(r0, &(0x7f0000000340)=@hci={0x1f, r1}, 0x80) ioctl(r0, 0x5, &(0x7f0000000240)="d29f035d8474b295856cc236c67317cdb92a4911cdc80453c48789c0941fd093a16409720a175aa53850c2a9e04954522e0ab28d8cb586362670aa082e70b25070dac160dba1e7839e5f3f6b2ca044bddfb3d9f3707d54ba70075ff41fcccb38") 08:45:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe8\x00', 0x43732e5398416f17}) 08:45:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs-', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 470.280303][T20430] XFS (loop0): device supports 512 byte sectors (not 0) [ 470.307254][T20443] UBIFS error (pid: 20443): cannot open "./fil", error -22 08:45:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 470.599856][T20559] UBIFS error (pid: 20559): cannot open "ÌKj㞀vÔ½ú«|íÜ¢RænÓøjoÅ|bä&ni°×Y•GM .O>P|°›XíJ=Kß œñׇý,§ƒk1¬rúÈ“ó;XÇ™˜>š—t [ 470.599856][T20559] :Ô§üP.Æ„§'· 1ø¾ùœEu)Ì}²'uÆÑà ©¥c–.ì‘ [ 470.599856][T20559] ¶ô½e=5Õÿ˜:Æd{™€ýjVÁ„ôÑ´Åv”Î' :×s", error -22 [ 470.631389][T20559] UBIFS error (pid: 20559): cannot open "ÌKj㞀vÔ½ú«|íÜ¢RænÓøjoÅ|bä&ni°×Y•GM .O>P|°›XíJ=Kß œñׇý,§ƒk1¬rúÈ“ó;XÇ™˜>š—t [ 470.631389][T20559] :Ô§üP.Æ„§'· 1ø¾ùœEu)Ì}²'uÆÑà ©¥c–.ì‘ [ 470.631389][T20559] ¶ô½e=5Õÿ˜:Æd{™€ýjVÁ„ôÑ´Åv”Î' :×s", error -22 08:45:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 08:45:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:56 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x100, 0x20000) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f0000000240)=""/166, &(0x7f0000000180)=0xa6) syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000001) 08:45:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="0100000000000000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$getregs(0xc, r0, 0x7ff, &(0x7f0000000080)=""/253) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000500)=0xe8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/fuse\x00', 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000800)='/dev/usbmon#\x00', 0xffff, 0x2) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000840)=r3) syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000200)='./file0\x00', 0xb7, 0x2, &(0x7f00000003c0)=[{&(0x7f00000002c0)="467e7067f787a5efdd16d596fea4d6978a2f304365ffc3005fb421228a17b7132391b1e3db5682ee7a2cccf7fdc268f617ab822e501e6c059c6a98708d384a8c4a031c6bd1eafdc1c4f58c49c946503667caa53f8773e1c7b681d83caf7402968f0272c8794b72d19c54f20791ba6102ed0f1191d9364b90390608f6f4177047b49cc00652e29bf6c0c0d38a3b51be57c809633da24fce26e1f46e4a13dcf1dc4da69de9cafaa02c8bd1", 0xaa, 0x4000000}, {&(0x7f0000000380)="8d27e6e327583056f842bba717349b0f", 0x10, 0xf5}], 0x1000, &(0x7f0000000540)={[{@inode32='inode32'}, {@nogrpid='nogrpid'}, {@nouuid='nouuid'}], [{@obj_user={'obj_user'}}, {@subj_user={'subj_user', 0x3d, 'ubifs\x00'}}, {@euid_eq={'euid', 0x3d, r1}}, {@dont_measure='dont_measure'}]}) r4 = syz_open_dev$vbi(&(0x7f00000005c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000600)={0x0, 0x1, 0x30}, &(0x7f0000000640)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000680)={r5, 0x9b17}, &(0x7f00000006c0)=0x8) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000700)={'security\x00'}, &(0x7f0000000780)=0x54) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x7) 08:45:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xe9\x00', 0x43732e5398416f17}) 08:45:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsf', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 470.986057][T20599] UBIFS error (pid: 20599): cannot open "", error -22 08:45:56 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000600)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000006c0)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x38}], 0x0, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0, &(0x7f0000000000), 0x1200081, &(0x7f00000008c0)=ANY=[@ANYBLOB="6e6f646973636172642cc29c941bee843de76c61726765696f2c7071756f74612c6e6f626172726965722c6e6f757569642c66696c65737472656b0441a50c3f579e62e37a82220ab845cd42fd2a425eadbd647cdb728e8225e67b2ce3e947819bd5f59d8f2aa371386a49f5568263ad3a3b94868fc30e8d37eb3e5f4de0620c23d3d13627f41615acba97853cecaeb853245decceffd5d626a832a52e5df9e6245f9292d94fcf095226e704543e5f58ef03d3a5f9195ebf1c76", @ANYRESDEC=r0, @ANYRES16]) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) 08:45:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 471.124291][T20599] UBIFS error (pid: 20599): cannot open "", error -22 [ 471.156951][T20678] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="001f7100e4ff00e1e9004f6bb5e7e8c6436c9c24b40201e017afb0cc0c1cc2ad4d25f1c7bee9b1be56f05abade86626672a481e747ef4d0d9817aa466194027ba4194648db6562dcdc95f08143451e11552a44d43d865f42a5b29a"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x200000, 0x0) 08:45:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xea\x00', 0x43732e5398416f17}) 08:45:56 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x200, 0x100) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000180)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) [ 471.490080][T20808] UBIFS error (pid: 20808): cannot open "(null)", error -22 08:45:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a4", 0x66}], 0x0, 0x0) 08:45:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) r2 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = fsopen(&(0x7f0000000080)='pstore\x00', 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000000c0)={r3, r4, 0xd21}) 08:45:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x97', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x02\xfd\xeb\x00', 0x43732e5398416f17}) 08:45:57 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0xfff, 0x10000) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000280)=0xffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x600, 0x0) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x1012, 0x6) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) [ 471.901554][T20920] UBIFS error (pid: 20920): cannot open "./file0", error -22 [ 471.973546][T20920] UBIFS error (pid: 20920): cannot open "./file0", error -22 08:45:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 471.998540][T20933] XFS (loop0): device supports 512 byte sectors (not 0) 08:45:57 executing program 2: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x200, 0x8, 0xc9b}, 0x4}, 0x20, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000600)=0xe8) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="bc8871bedddddeb3b351c0e476765cb217380d8b05731920da1c54a7ff5c92e5ada6329617155b3a1726a7725fccbe1b24c57e94", 0x34, 0x1}, {&(0x7f00000001c0)="44875e4493d8243c354cf009cc08fc5af8efa990ace0e8f69a30656d5eb9a9e5c07d44ca0790a2432186a5bb9819599d793b760d04e5d8686253ed4bb205c1", 0x3f, 0x5a}], 0x20000, &(0x7f0000000640)={[{@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r0}}, {@session={'session', 0x3d, 0x4}}, {@gid={'gid', 0x3d, r1}}, {@gid={'gid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, r3}}, {@smackfshat={'smackfshat', 0x3d, '&'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, 'eth0'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:45:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:57 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r1 = dup(r0) getsockopt$inet_int(r1, 0x0, 0x1, &(0x7f00000000c0), &(0x7f0000000180)=0x4) 08:45:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', 0x43732e5398416f17}) 08:45:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 472.396581][T21070] UBIFS error (pid: 21070): cannot open "./file0", error -22 08:45:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) getresuid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x101, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="fbf27a8fecacd8b3648361f11f2bbe6d2eb7b5b3d3e3ddfc600b3a0ba2496b11ce22c94c3e26708a93fe8d0c24fc8f5da6f12c6d7e7306ca08f999632e6193e9c2a9fd6ba00394cb8f45b76f44a1cfe09399eecf9f3db66f47b1814b3f2bea96eea339bbf93098769115ef3ac66ae09e48d0727197c772a2a3913ee76a3ccc24b95c64baccaffdbff7", 0x89, 0x5}], 0x2000000, &(0x7f00000004c0)={[{@decompose='decompose'}], [{@subj_type={'subj_type', 0x3d, ':eth1'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@fowner_lt={'fowner<', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, '-{\\security}trusted]]}keyringvboxnet0(,'}}, {@smackfshat={'smackfshat'}}, {@fowner_lt={'fowner<', r3}}]}) 08:45:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402", 0x67}], 0x0, 0x0) 08:45:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:58 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x80, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80800) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 472.880977][T21198] hfsplus: unable to parse mount options [ 472.912888][T21193] XFS (loop0): SB sanity check failed [ 472.925554][T21193] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 472.947897][T21193] XFS (loop0): Unmount and run xfs_repair [ 472.954836][T21193] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 473.022503][T21193] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 08:45:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\xff\xff\xff\xfe\x00', 0x43732e5398416f17}) 08:45:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696c653000eba2ed78bcd1940c2f1629051eb05aa7e327685b9136c70979a0cdff9f4f425857b85a5f978de16f173da5461b6f4ce901da4311f7b211e3f4d0b9e240a715"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 473.089115][T21193] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 473.109392][T21193] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 08:45:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe5', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:58 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) io_uring_enter(r0, 0x3, 0xfff, 0x3, &(0x7f0000000180)={0x9}, 0x8) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x4}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r1, 0x81}, 0x8) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e21, 0x4, @local, 0x400}}, 0x1ff, 0x6}, &(0x7f00000003c0)=0x90) rt_sigpending(&(0x7f0000000400), 0x8) [ 473.194111][T21193] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:45:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 473.253914][T21193] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 473.338852][T21193] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 473.383634][T21193] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 473.385909][T21325] UBIFS error (pid: 21325): cannot open "./file0", error -22 [ 473.407352][T21323] UBIFS error (pid: 21323): cannot open "./file0", error -22 [ 473.423577][T21193] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:45:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40100, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000080)) [ 473.507546][T21193] XFS (loop0): SB validate failed with error -117. 08:45:58 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x48f, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'wrr\x00'}, 0x2c) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7) 08:45:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x43732e5398416f17}) [ 473.770662][T21444] UBIFS error (pid: 21444): cannot open "./file0", error -22 08:45:59 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402", 0x67}], 0x0, 0x0) 08:45:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:45:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2ec24b696c653004"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 473.781928][T21444] UBIFS error (pid: 21444): cannot open "./file0", error -22 08:45:59 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x100000001, 0x10040) sendmmsg$inet_sctp(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000240)="f355d3e82d6227836f8594627b47a0a4cad897b526cacde46febc4880b2bb7d0083218e6b6372954d7544b0d982d6e315de2a1d5ef75e38150970c071084279000f7e213116655980ac11b7722a805", 0x4f}], 0x1, 0x0, 0x0, 0x1}], 0x1, 0x10) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 474.136538][T21554] XFS (loop1): Mounting V4 Filesystem [ 474.165376][T21554] XFS (loop1): empty log check failed [ 474.179045][T21554] XFS (loop1): log mount/recovery failed: error -5 [ 474.201026][T21572] UBIFS error (pid: 21572): cannot open ".ÂKile0", error -22 [ 474.224415][T21566] XFS (loop0): SB sanity check failed [ 474.239976][T21566] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 08:45:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="062f66696c653000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file1\x00', 0x4, 0x44) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)={0xef, 0x100, 0xfffffffffffffc01, 0x866, 0x8, 0x5}) [ 474.295083][T21566] XFS (loop0): Unmount and run xfs_repair [ 474.301313][T21554] XFS (loop1): log mount failed 08:45:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x43732e5398416f17}) 08:45:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:45:59 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000180)=0xfffffffffffff57a) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 474.378957][T21566] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 474.396268][T21566] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 474.429095][T21566] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 474.503531][T21566] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 474.579063][T21566] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 474.604510][T21566] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 474.626785][T21689] UBIFS error (pid: 21689): cannot open "/file0", error -22 [ 474.635933][T21689] UBIFS error (pid: 21689): cannot open "/file0", error -22 [ 474.652800][T21566] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 08:46:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) splice(r1, &(0x7f0000000080)=0x5, r2, &(0x7f00000000c0), 0xfff, 0xb) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000340)={r3, 0x7, 0x46}, 0x8) r4 = open(&(0x7f0000000100)='./file0\x00', 0x400002, 0x40) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f0000000140)={0x88, "43b0fafdda26967945c72cc2ad6d14430c685dddce17d15f9416ecd224f321a4", 0x3, 0x1}) [ 474.730085][T21566] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 474.768049][T21566] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:46:00 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xc0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x8000005, 0x3, 0x1}) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5008f00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 474.834042][T21566] XFS (loop0): SB validate failed with error -117. [ 474.962584][T21802] UBIFS error (pid: 21802): cannot open "./file0", error -22 [ 474.990575][T21802] UBIFS error (pid: 21802): cannot open "./file0", error -22 08:46:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, r1, 0x3f}) 08:46:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x80\x87\xff\xff\xff\xff\x00', 0x43732e5398416f17}) 08:46:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs@', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402", 0x67}], 0x0, 0x0) 08:46:00 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = socket$inet(0x2, 0x7, 0x800000000000000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="17ff0500000006000500b38a00000800"], &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1, 0x3}, &(0x7f0000000280)=0x8) [ 475.448005][T21920] UBIFS error (pid: 21920): cannot open "./file0", error -22 [ 475.507638][T21920] UBIFS error (pid: 21920): cannot open "./file0", error -22 08:46:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r1, 0xe05, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7ff, 0x7f, 0x3, 0xffffffffffffa5ff}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x24000080) llistxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=""/1, 0x1) 08:46:01 executing program 4: perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffffffffff4a}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0xff, 0x7e, 0x2, 0x55, 0x0, 0x8, 0xa00, 0x4, 0x0, 0x229, 0x1f, 0x62, 0x4, 0x2, 0x2a80000000, 0xfffffffffffffff9, 0x5, 0x9, 0x2, 0xfff, 0xf0f, 0x3, 0x100, 0x2, 0x5, 0x8, 0xfffffffffffffffc, 0x2, 0xffffffff, 0x8, 0x81, 0x6, 0x7, 0x9, 0x5, 0x5b6e, 0x0, 0xf8cf, 0x4, @perf_bp={&(0x7f0000000180)}, 0x8000, 0x7, 0x100000000, 0xf, 0xe0000000000, 0x6, 0x3}, r0, 0x1, 0xffffffffffffff9c, 0x2) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4000, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() r4 = getuid() r5 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f00000003c0)={0x150, 0x0, 0x5, [{{0x3, 0x0, 0x3f, 0x5, 0x100000000, 0x5, {0x1, 0x5f9f, 0x3f, 0x5, 0x0, 0x9, 0x8, 0x5, 0x7f, 0x6d6, 0xaa, r2, r3, 0x0, 0x1}}, {0x6, 0x3, 0x4, 0x6a0, 'xfs\x00'}}, {{0x6, 0x0, 0x4, 0x7, 0x400, 0x26e4c00, {0x6, 0x8, 0x1ad0, 0xfffffffffffffffd, 0x2, 0x6, 0x1, 0x81, 0x0, 0x800, 0x2, r4, r5, 0xe8a, 0x5}}, {0x0, 0x1d3, 0x4, 0x5, 'xfs\x00'}}]}, 0x150) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r6, 0x402c5342, &(0x7f0000000240)={0x4, 0xffff, 0x6, {}, 0x400, 0x7fffffff}) 08:46:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 475.762771][T22025] XFS (loop0): SB sanity check failed [ 475.768308][T22025] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 475.782808][T22047] UBIFS error (pid: 22047): cannot open "./file0", error -22 [ 475.787623][T22047] UBIFS error (pid: 22047): cannot open "./file0", error -22 [ 475.791469][T22025] XFS (loop0): Unmount and run xfs_repair [ 475.861370][T22025] XFS (loop0): First 128 bytes of corrupted metadata buffer: 08:46:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r1 = accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10, 0x80800) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='./fi\x00\x00\x00\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 475.910694][T22025] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 475.943032][T22025] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 08:46:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x02\x00', 0x43732e5398416f17}) [ 476.038989][T22025] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 476.070112][T22025] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 08:46:01 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x8000) r1 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) linkat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000280)='./file0/file0\x00', 0x1400) [ 476.080702][T22025] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 476.090405][T22025] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 476.151143][T22025] 00000060: 00 00 06 c0 34 a4 02 00 00 00 00 00 00 00 00 00 ....4........... [ 476.192889][T22164] UBIFS error (pid: 22164): cannot open "./fi", error -22 [ 476.197004][T22025] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 476.219783][T22168] UBIFS error (pid: 22168): cannot open "./fi", error -22 [ 476.273987][T22025] XFS (loop0): SB validate failed with error -117. 08:46:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x03\x00', 0x43732e5398416f17}) 08:46:01 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x412000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='./fine0\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:01 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) fcntl$setown(r0, 0x8, r1) 08:46:02 executing program 2: setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00fb6b02ffd8f8af49783c154fd56f17cc62a482a6433b6b1b0d5d14ba00fe5d9397b4f2d7d9f14c4f664cf3e6831b6405468b4519a28f77ca88fc7570acd7f4d9d348671f7ea4173662091b5199a74064a757818f73d059f89abb7d03cdbaa570ef05907cefd73a5f608f"], 0x6b, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x40, 0x0) getdents64(r0, &(0x7f00000002c0)=""/165, 0xa5) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="ff24832c05bdbbbccf7c8fb9452f655703000000000400b37086887614b8b502f89e271a080e000046ff"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:02 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r1, 0x300, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ipddp0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000804) connect$caif(r0, &(0x7f0000000180)=@rfm={0x25, 0x6, "20e89debb81bbe9b913931f4f86fc615"}, 0x18) 08:46:02 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x04\x00', 0x43732e5398416f17}) 08:46:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xde', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 477.034566][T22405] UBIFS error (pid: 22405): cannot open "ÿ$ƒ,½»¼Ï|¹E/eW", error -22 [ 477.079955][T22400] XFS (loop0): Mounting V4 Filesystem 08:46:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 477.150849][T22400] XFS (loop0): empty log check failed [ 477.169062][T22400] XFS (loop0): log mount/recovery failed: error -5 [ 477.279172][T22400] XFS (loop0): log mount failed [ 477.418083][T22533] UBIFS error (pid: 22533): cannot open "/dev/nullb0", error -22 08:46:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:46:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000001680)={0x800}, 0x4) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x240, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x05\x00', 0x43732e5398416f17}) 08:46:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2a2f66696c750200"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 477.853224][T22553] UBIFS error (pid: 22553): cannot open "*/filu", error -22 [ 477.888156][T22550] XFS (loop1): Mounting V4 Filesystem 08:46:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='reiserfs\x00', 0x4000, &(0x7f0000000100)='%\x00') 08:46:03 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 477.969833][T22550] XFS (loop1): empty log check failed [ 477.988951][T22550] XFS (loop1): log mount/recovery failed: error -5 [ 478.080509][T22634] XFS (loop0): Invalid superblock magic number [ 478.128959][T22550] XFS (loop1): log mount failed 08:46:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x06\x00', 0x43732e5398416f17}) [ 478.211381][T22682] UBIFS error (pid: 22682): cannot open "./file0", error -22 [ 478.219801][T22682] UBIFS error (pid: 22682): cannot open "./file0", error -22 08:46:03 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) sysfs$1(0x1, &(0x7f00000000c0)='xfs\x00') 08:46:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xbc) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f66696c6ad41a068f72470e151c745a54d25296653000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x6}, 0x28, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffec6, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:46:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\a\x00', 0x43732e5398416f17}) 08:46:03 executing program 4: perf_event_open(&(0x7f00000001c0)={0x5, 0x58, 0x3e6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='adfs\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x500) [ 478.641603][T22902] UBIFS error (pid: 22902): cannot open "./filjÔrGtZTÒR–e0", error -22 08:46:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 478.996678][T22960] XFS (loop1): Mounting V4 Filesystem [ 479.003586][T22959] kvm: emulating exchange as write 08:46:04 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x290000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000240)={0x6, 0x3, 0x100000000, 'queue1\x00', 0x80000001}) 08:46:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x100}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x5, 0x3, [0x9, 0x6, 0x7]}, 0xe) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7fff, 0x208080) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000080)=0x7) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='./file \x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 479.054183][T22960] XFS (loop1): empty log check failed [ 479.087561][T22960] XFS (loop1): log mount/recovery failed: error -5 08:46:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\b\x00', 0x43732e5398416f17}) 08:46:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 479.299063][T22960] XFS (loop1): log mount failed 08:46:04 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffffffffffe87) write$FUSE_NOTIFY_INVAL_ENTRY(r0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lseek(r0, 0x8000000f, 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ftruncate(r0, 0x0) [ 479.383279][T23050] UBIFS error (pid: 23050): cannot open "./file ", error -22 08:46:04 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d, 0x2}], 0x0, 0x0) [ 479.402243][T23087] UBIFS error (pid: 23087): cannot open "./file ", error -22 08:46:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="07000c0000000da000a25d134c452f464669ee4a2357567bf22e2db50ebb2c585921b53cdefa0851f2fe3fbbc04b2b6c4aca6c9fb43b0299ee23c32472f121e8c6ec37993054a3ce997d0c8478deda4345279e3e9b36bddb25df4c7fb99387843b5c651d24f4974e3759aad8ddf536b40eaf9a9ab12d44a950b62dbbd501ffc6b181ed8f62cc895cb8f070fdb0d8191beba3e17f4d047a9bf1288c095200"/172], 0xac, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000080)=""/204) 08:46:05 executing program 0: timer_create(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003380)='/dev/ptmx\x00', 0x8000000000009, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15}) 08:46:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:05 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x200000) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000180)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x80000000, 0x0, 0x7, 0x7, 0x4, [{0x4, 0x0, 0x40, 0x0, 0x0, 0x882}, {0x401, 0x200, 0x5103, 0x0, 0x0, 0x200}, {0xffffffffffff7dfa, 0x3, 0x3ff, 0x0, 0x0, 0x80}, {0x7, 0x2, 0xfff, 0x0, 0x0, 0x4}]}) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d, 0x6}], 0x0, 0x0) [ 479.747543][T23203] UBIFS error (pid: 23203): cannot open "./file0", error -22 [ 479.763701][T23203] UBIFS error (pid: 23203): cannot open "./file0", error -22 08:46:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00H\x00', 0x43732e5398416f17}) 08:46:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696c65300005c35e7891bef9444d90a986a6f4b47fa88e5be80700d7818923e23c9d258f2ce8ed539b01cc9a4bd3b3fafcc407e119916b571094a6d12cfe9c6f210aed26a1b65839a171d7ec1e86136b81cbca7bba49a0e77d79e147d7fb4e0751735a6e4511e4b6768f1591bdf35d5cb7b5eff9ba06e055014888e8d4bfea2f331bce92ad6168dab27acfaf8b30bccbd69faa2fda9778d67af2239f28ec8faebf1b040213d381dda72577395e86f925151da1dcbb88f80e9ddfa9a1b9edfa6990"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:05 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr(r0, &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f0000000200)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x2b6, 0x0) 08:46:05 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0x20202, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:46:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009a00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) shmget(0x0, 0x3000, 0x8, &(0x7f0000ffa000/0x3000)=nil) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="3004000000000000912fceb691c15cbc"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0xd48193ce990a8293, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3f, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)) [ 480.332061][T23383] XFS (loop1): Mounting V4 Filesystem [ 480.398277][T23383] XFS (loop1): empty log check failed [ 480.422329][T23383] XFS (loop1): log mount/recovery failed: error -5 08:46:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:46:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009b00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00L\x00', 0x43732e5398416f17}) [ 480.539095][T23383] XFS (loop1): log mount failed 08:46:05 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000340)=0x78) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fcntl$getown(r0, 0x9) 08:46:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2e2f6462041c0c77700ee07aebb2666900"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000100)) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x2, 0x4) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r0, 0x540e, 0x9) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000140)={0x77359400}, 0x10) [ 480.648173][T23511] UBIFS error (pid: 23511): cannot open "0", error -22 [ 480.943918][T23631] UBIFS error (pid: 23631): cannot open "./db wpàzë²fi", error -22 [ 480.968272][T23631] UBIFS error (pid: 23631): cannot open "./db wpàzë²fi", error -22 08:46:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:06 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) 08:46:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009c00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00h\x00', 0x43732e5398416f17}) 08:46:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/167) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:46:06 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x0, 0x0) [ 481.259564][T23671] UBIFS error (pid: 23671): cannot open "./file0", error -22 [ 481.282914][T23716] UBIFS error (pid: 23716): cannot open "./file0", error -22 08:46:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x28, 0x101000) mkdirat(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x110) creat(&(0x7f0000000100)='./file0/file0/../file0\x00', 0x20) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="f0aa74ce2398385c"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='\x00', 0x200000, 0x0) [ 481.393004][T23744] XFS (loop1): Mounting V4 Filesystem 08:46:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009d00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 481.530135][T23744] XFS (loop1): empty log check failed [ 481.552713][T23744] XFS (loop1): log mount/recovery failed: error -5 [ 481.611000][T23744] XFS (loop1): log mount failed 08:46:06 executing program 4: poll(&(0x7f0000000040), 0x2015, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xa4d, 0x0, 0x0, 0x800e00928) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x7}, 0x0, 0x0) shutdown(r0, 0x0) 08:46:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00l\x00', 0x43732e5398416f17}) 08:46:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66036c653000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 481.963165][T23943] UBIFS error (pid: 23943): cannot open "./fle0", error -22 08:46:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009e00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:46:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x1ff000, 0x0, [], {0x0, @bt={0x66, 0x1ff, 0x1, 0x2, 0x5, 0xbcb, 0x5, 0x6, 0x7fff, 0x2, 0x6, 0x3ff, 0x9, 0x4, 0x10, 0x11}}}) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000001480), &(0x7f00000014c0)=0x4) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x528) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f00000013c0)=[{&(0x7f0000000200)="f76fad1b215c73cfa1aacbf3069d6d9cde7712c2dff2062898fc941ad7405d0f323a14a3ceeca3b5503922a42499d67f049798ae6ed3d308", 0x38, 0x8000000000000000}, {&(0x7f00000002c0)="26430e81166f082195b04809907ebc6ce77435e3c615afd8a986047fea00150625c22093a72865396322d0d02662bce1a84cac119b6d26d33557b9098b3ad78e288611b366656292efaa8b66e6fd34f68359102a4c90d9885548f90dbce6a096fbf1497fb2f40afbf7c0834167d42374a6cdea76826878e33514b46e8733fc84079fca83c10d4a66bad90a1edc1be00d5e92abad5e1b9eda36fe1469e98236927e0bbd16fcff0212f08bd6937ebc5044", 0xb0, 0x9}, {&(0x7f0000000380)="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", 0x1000, 0x8}, {&(0x7f0000001380)="9a0509437ce5a045b608d2f391f41a", 0xf, 0x8}], 0x21, &(0x7f0000001440)={[{@noacl='noacl'}, {@acl='acl'}, {@noacl='noacl'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) 08:46:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/157, 0x9d}, {0x0}], 0x2}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x4e5cc83, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) msgget$private(0x0, 0x0) recvfrom$inet(r2, 0x0, 0x3c7, 0x2, 0x0, 0x800e00545) shutdown(r2, 0x0) 08:46:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00t\x00', 0x43732e5398416f17}) 08:46:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d5009f00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 482.251026][T24002] UBIFS error (pid: 24002): cannot open "./file0", error -22 [ 482.370926][T24002] UBIFS error (pid: 24002): cannot open "./file0", error -22 08:46:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000100)=[{r0, 0x1}, {r0, 0x40}], 0x2, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x5126d786b45b1d5f, 0x0, 0x0, 0x800e00ab7) ppoll(&(0x7f0000000000)=[{r1, 0x2}], 0x1, 0x0, 0x0, 0x2eb) r2 = fcntl$dupfd(r1, 0x0, r1) shutdown(r2, 0x0) [ 482.481335][T24048] XFS (loop1): Mounting V4 Filesystem 08:46:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="53739bb085d13527571e16005a3dadf65cae7826ec3a00000000000000000001"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) fcntl$setlease(r0, 0x400, 0x0) [ 482.564334][T24048] XFS (loop1): empty log check failed [ 482.570802][T24048] XFS (loop1): log mount/recovery failed: error -5 08:46:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 482.659041][T24048] XFS (loop1): log mount failed 08:46:08 executing program 4: poll(0x0, 0x0, 0x42) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00509) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r2) flock(0xffffffffffffffff, 0x0) recvfrom$inet(r2, 0x0, 0x2279, 0x0, 0x0, 0x800e00511) shutdown(r2, 0x0) 08:46:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00z\x00', 0x43732e5398416f17}) [ 482.822080][T24237] UBIFS error (pid: 24237): cannot open "Ss›°…Ñ5'W", error -22 [ 482.853767][T24237] UBIFS error (pid: 24237): cannot open "Ss›°…Ñ5'W", error -22 08:46:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:46:08 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) 08:46:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x7e, 0x0, 0x0, 0x800e005c0) shutdown(r0, 0x0) [ 483.234999][T24358] UBIFS error (pid: 24358): cannot open "./file0", error -22 [ 483.239830][T24358] UBIFS error (pid: 24358): cannot open "./file0", error -22 08:46:08 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:08 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x10000, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x14200, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x03\x00', 0x43732e5398416f17}) 08:46:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000080)=""/116, 0x74}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xc8f4, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000880)=[{&(0x7f0000000340)=""/170, 0xaa}, {0x0}, {0x0}, {0x0}], 0x4) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/194, 0xc2}, {0x0}], 0x2}, 0x0) shutdown(r5, 0x0) dup2(r1, r2) shutdown(r2, 0x0) [ 483.505346][T24387] XFS (loop1): Mounting V4 Filesystem [ 483.566441][T24387] XFS (loop1): empty log check failed 08:46:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 483.609185][T24387] XFS (loop1): log mount/recovery failed: error -5 [ 483.679034][T24387] XFS (loop1): log mount failed 08:46:09 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x80) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:09 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 08:46:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\xe8\x03\x00', 0x43732e5398416f17}) 08:46:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xb9fd7032, 0x20000020081) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x8000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, &(0x7f0000000140)=0x4) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0x9, 0xfffffffffffffff8}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={r2, 0x80000000}, 0x8) 08:46:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x4000) [ 484.340626][T24632] UBIFS error (pid: 24632): cannot open "./file0", error -22 [ 484.353738][T24699] UBIFS error (pid: 24699): cannot open "./file0", error -22 08:46:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x37a, 0x82) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x05\x00', 0x43732e5398416f17}) [ 484.636082][T24725] XFS (loop1): Mounting V4 Filesystem [ 484.671150][T24741] UBIFS error (pid: 24741): cannot open "./file0", error -22 [ 484.718937][T24725] XFS (loop1): empty log check failed [ 484.724410][T24725] XFS (loop1): log mount/recovery failed: error -5 [ 484.820842][T24725] XFS (loop1): log mount failed 08:46:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) 08:46:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x06\x00', 0x43732e5398416f17}) 08:46:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 485.330719][T24879] UBIFS error (pid: 24879): cannot open "/dev/sg0", error -22 [ 485.332904][T24879] UBIFS error (pid: 24879): cannot open "/dev/sg0", error -22 08:46:10 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x1, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000340)) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x10c) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x1) getsockopt$inet6_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000100)=""/126, &(0x7f0000000000)=0x7e) read$rfkill(r1, &(0x7f0000000300), 0x8) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x400) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r2, 0x0, 0x6, 0x8000, 0x1000}) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000001c0)={0xe, 0x0, 0x1, 0x6, 0x5, "b524232f35"}, 0x11) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f4affffef3000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:10 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x841, 0x0) 08:46:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\a\x00', 0x43732e5398416f17}) 08:46:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @remote}, 0x0, 0x800) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x38, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x200, @mcast1, 0x55b3}, @in6={0xa, 0x4e23, 0x5, @ipv4={[], [], @loopback}}]}, &(0x7f0000000200)=0x10) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 08:46:10 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x1f, &(0x7f0000000080)=0x2, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 485.911966][T25140] UBIFS error (pid: 25140): cannot open "./file0", error -22 08:46:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00 '], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) fstat(0xffffffffffffffff, 0x0) 08:46:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00&\x0f\x00', 0x43732e5398416f17}) 08:46:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x100, 0x0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000180)=0xd0, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x21) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x9) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000080)="a9e15f2a7b108499ef1d6223aefc24419100906b39dc9581f973fac957102a8f91b0322264f6e3306c832aafd8404db1e5609ed8bc0afb9aa2ea552d20e0") mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x400, 0x0) 08:46:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) [ 486.202602][T25227] UBIFS error (pid: 25227): cannot open "(null)", error -22 08:46:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500a900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:11 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x5, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000080)) 08:46:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500aa00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x1f\x00', 0x43732e5398416f17}) 08:46:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) [ 486.658288][T25406] UBIFS error (pid: 25406): cannot open "./file0", error -22 [ 486.759193][T25348] XFS (loop1): Mounting V4 Filesystem [ 486.796005][T25348] XFS (loop1): empty log check failed [ 486.823646][T25348] XFS (loop1): log mount/recovery failed: error -5 08:46:12 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500ab00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 486.883323][T25469] UBIFS error (pid: 25469): cannot open "./file0", error -22 [ 486.909190][T25348] XFS (loop1): log mount failed 08:46:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) 08:46:12 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40c200, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00 \x00', 0x43732e5398416f17}) 08:46:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500ac00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="69e2b549f8db6ddd8114baa47c48debadcfe14f63e094e3792cf7ce13cf247569cc373c7e0dad000998b61ba44427da4d48d66d130a16d7554d3717587d6c8b02d080cdfb62b36ac495207c61558bb7eee400e185b68cd"], 0x0, 0x57}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101], 0x1f004}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:46:12 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x100, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r2, 0x0) close(r3) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000540)=[@text64={0x40, &(0x7f00000004c0)="48b800800000000000000f23d80f21f835800000800f23f80f20d835080000000f22d8660f38811a0f20d835200000000f22d8420f218fc4e37d05360066baa00066ed3e460f00d626400f01c5c744240027010000c74424028d000000ff2c24", 0x60}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffd18, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200000, 0x4) utimensat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x77359400}}, 0x100) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500ad00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fchmod(r0, 0x0) 08:46:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x0f&\x00', 0x43732e5398416f17}) 08:46:13 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 487.940627][T25810] UBIFS error (pid: 25810): cannot open "(null)", error -22 08:46:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x40605346, &(0x7f00000001c0)={0x0, 0x0, 0x1, 'queue0\x00\xff\x00\x00\x00\x00\xae\xc2\x00\x00\x00\x00\x00\x00\x00\x00\xe2\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7fv\x00'}) 08:46:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500ae00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00@\x00', 0x43732e5398416f17}) [ 488.260076][T25928] XFS (loop1): Mounting V4 Filesystem [ 488.317498][T25928] XFS (loop1): empty log check failed [ 488.341908][T25928] XFS (loop1): log mount/recovery failed: error -5 08:46:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_proto_private(r0, 0x89ed, &(0x7f0000000080)="8d7d0107a1c98157e763b8807f49439271aa6dc5079c3f56b1bd382c70f0f297b29bdd77cbb8564d8082dbc8a4d39b53ad7eee664aea3eb490aad6579b49632e2ba5f836e1748177f0caa4b9ac31a2fc69e8c96ca5374081951d43bd0ca0bd64987409d7a781ab2b019084b22be6db0a91ff62fcfed6f74f6db6ffbe740b60ea1d0147d3556bed3c8040a8d29c368e8c4ae23e79a99fdfacee25bdf44081d5e11ebd581aded4f192e70a21ed6f0502ee30956c1c613370971614556cd20a825af6bb1b15ad84bcd167c667bb2d2f4c5c91c5b86c34d3") 08:46:13 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500af00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 488.439021][T25928] XFS (loop1): log mount failed 08:46:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x100000000, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) fstat(r0, &(0x7f0000000700)) [ 488.701058][T26059] UBIFS error (pid: 26059): cannot open "./file0", error -22 [ 488.711565][T26059] UBIFS error (pid: 26059): cannot open "./file0", error -22 08:46:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x12000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xbc, &(0x7f0000000080)=[@in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e20, 0xe11, @loopback, 0x5}, @in6={0xa, 0x4e23, 0x100000000, @ipv4={[], [], @empty}, 0x7}, @in6={0xa, 0x4e20, 0xffffffff, @local, 0x5bf}, @in6={0xa, 0x4e23, 0xf8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0xfffffffffffffff8}, &(0x7f0000000200)=0x8) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./file0\x00', 0x7, 0x4, &(0x7f0000000780)=[{&(0x7f00000004c0)="b45ad884f9698ffd5d317b521675de455391b941663f91030ff0ed0f07665f39d98025ab1352206b76ea6e55a47d7cab1b22d4ca46cf127a5fa9321b0546d46a409ef8176c422291f2085352cd6b031d7d217bf26a3596e2e4b7eb8958ff8a0f72b37a5cb9aeebe92f5926fd006615aae569036ae6978fc1dd61fb79c6ca0ecc9857c7", 0x83, 0x7f}, {&(0x7f0000000580)="4a59b8c97056ca583d7cec041a5f4b9c16237d349f7d7860a43771f1279c11eeac1263a8d2", 0x25, 0x101}, {&(0x7f00000005c0)="5f3cb40ead66a56ff4a0ba043700446a9fa371704a1336387b33e408bb0461c8713f2ceb4914274e9383841bd2d0fbc7e4f933c42432df2cf1a2bf7ba9f525ccd0b1482a857b65ce3b38b6c163aac1329f0006b26aedd6981f7d66b4a02adb9d59600446189f6fca0e7d25e53740cdaa775b3ddf8bb7dd28d70c514ef914ee2dbec859b6316b04243121c36e702db38da61955734ca986f42f9b3fae7224c0", 0x9f, 0x6}, {&(0x7f0000000680)="d8b34c158213f9625adb0857fd5b692353e454715e6fc7870ccf21a837239a1196b2884ed58ba6c4ef45939ace1ddf43b5c58db84145a6ca70e3bb487b7456569b531eb8efa0109ae9fbcf5b6da90245db982b46befdd2bb30d3db0731444fc34904c8883c241e4302d3af581e961b79b265fe98bd42d8e335938d026032802fd85dcce5f14e843eb1d8b87bfb56d1706fe7d25c1b2989c79f42ba30c8f2bcc562787fb841236a8c09fd8c38dd4e4e195c92d6c25eca1ada124edc3747ca4586ef16", 0xc2, 0x9f}], 0x80002, &(0x7f0000000800)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x53b5}}, {@fmask={'fmask', 0x3d, 0x6}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@permit_directio='permit_directio'}]}) 08:46:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) inotify_init() fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, &(0x7f0000000180)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000240)) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, 0x0) splice(r1, 0x0, r2, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x80803) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)) setsockopt$inet6_mtu(r5, 0x29, 0x17, 0x0, 0xbe2) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20048800) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x1ff) sendto$packet(r5, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 08:46:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b000000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00H\x00', 0x43732e5398416f17}) 08:46:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:14 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000015000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 489.108396][T26232] UBIFS error (pid: 26232): cannot open "oæá9rZµ]NKµÜúC‰ç%èý'„¨ÖPu³Ó§,iê6Qß ê>0Úš®óƒ©¡HÿP ©éï¹|“ëÓc ß”èQÂqÒÚº A8¬ªýëM=¹¶Ñ,ê‹‹|>Mûã²ìC×(õü`q2ª.›Üž&&Á [ 489.108396][T26232] ¹V  nÙM¹§B§¹Æ”éÛílúÇ€e$¼Kdó¦`Úr²|ëëô7ÇØ Ó`y#2ya°è.‰Ž³Z¶ù­í(Å Þoš\,¿zE}¾Æ—RãÅϬÐU;9¤yW¤á»6šÝ?(å²/¢Á"w|Ää~÷¯É›†n-×%W£NWç¦;¦ô‚¶ÓZ´ïX Mø( 9.üç:nB0.õ…°&ؾ»6+™©ÃÌx÷Qksi™Dq ÷¶œ#ŸÇ‚9"3üëÌJj¤4-gô³T RGê½\•B£xgÄ~Û=r{$Å&´Îµ3j|Ïçn!`˜à£", error -22 08:46:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b100000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00L\x00', 0x43732e5398416f17}) 08:46:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80000, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ub\xee\x85\x82\xf4Q\xd4ifc\x00', 0x0, 0x0) [ 489.338686][T26232] UBIFS error (pid: 26232): cannot open "oæá9rZµ]NKµÜúC‰ç%èý'„¨ÖPu³Ó§,iê6Qß ê>0Úš®óƒ©¡HÿP ©éï¹|“ëÓc ß”èQÂqÒÚº A8¬ªýëM=¹¶Ñ,ê‹‹|>Mûã²ìC×(õü`q2ª.›Üž&&Á [ 489.338686][T26232] ¹V  nÙM¹§B§¹Æ”éÛílúÇ€e$¼Kdó¦`Úr²|ëëô7ÇØ Ó`y#2ya°è.‰Ž³Z¶ù­í(Å Þoš\,¿zE}¾Æ—RãÅϬÐU;9¤yW¤á»6šÝ?(å²/¢Á"w|Ää~÷¯É›†n-×%W£NWç¦;¦ô‚¶ÓZ´ïX Mø( 9.üç:nB0.õ…°&ؾ»6+™©ÃÌx÷Qksi™Dq ÷¶œ#ŸÇ‚9"3üëÌJj¤4-gô³T RGê½\•B£xgÄ~Û=r{$Å&´Îµ3j|Ïçn!`˜à£", error -22 08:46:14 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x3, 0x94001) syz_genetlink_get_family_id$tipc2(0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002703) 08:46:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b200000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 489.591744][T26405] Unknown ioctl 20993 08:46:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="1a988b0080006b7b85e0d8f7e5749184fa2dcca33eb6002f25daeb0000000030447e7b571fd3da658c403e8d159f8b143bb60b2d4c0d1411491ba86e8897057465484b8540b863ab8060c7ae2f3e406a87c42cc89ce8e7ddcf5a2c8283c41b0c594ec75355bc31f4d136ff28ff095985e7b59b443ac690d44137981b93017018795e32a618de88ef7c67f6341c855ff265a2ef51dac157d7f7d496dc78e2f0fbc7516104675987e9f0d29f7900f1d2b3528028c1b6d98b513cebf15ca67bf4e883eb88e17bfd85f0179c1f013796f0862e4e9d72572a3b8d56ecfc3419996818036a3b58a2deec8c644733c1ce13f22ab6e791"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x321000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) 08:46:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b300000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00h\x00', 0x43732e5398416f17}) 08:46:15 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:15 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '?'}, 0x119) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000980)="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", 0xdee}], 0x1) write$P9_RFLUSH(r1, &(0x7f0000000440)={0x7}, 0x7) write$P9_RUNLINKAT(r1, &(0x7f0000000200)={0x7}, 0x7) write$P9_RREADLINK(r1, &(0x7f0000000240)=ANY=[], 0xc9) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) write$P9_RWRITE(r1, &(0x7f00000002c0)={0xb}, 0xb) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 489.952448][T26524] UBIFS error (pid: 26524): cannot open "˜‹", error -22 [ 489.974612][T26524] UBIFS error (pid: 26524): cannot open "˜‹", error -22 08:46:15 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x18001, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000100)={0x2, "e7ae"}, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x121200, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="a36ff6fb25bccebe8cf06484b82c40cb", 0x10) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 490.197212][T26526] XFS (loop1): Mounting V4 Filesystem 08:46:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b400000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 490.229790][T26549] UBIFS error (pid: 26549): cannot open "./file0", error -22 [ 490.242968][T26526] XFS (loop1): empty log check failed [ 490.277003][T26526] XFS (loop1): log mount/recovery failed: error -5 08:46:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='G\xee\x9eP\xe3\x84:\x15\xd5\xe1\xbeZ!\xaeQ9%\xad\xaa\xaa\x0fk|\x19HZ\x8f\x95\xb4\x1a=\x90\xfb\xa4\xf0\xc4\x88\xfcu\xf9\xcfb\b\x00\x00\x00\xb7\xd1f\xe7\xc8W\xc8Z\xe9,\xc5UMm\xf4.\xef\xf4[\xc3\n\xd3\xb6\xd9z_\x82\xd2\xa9_\x8e\x1f/\xe1\xf2\x11l27@\xf0\xa7\x8b\xd1\nr\xb1zD1\x1d77\xc8\xd7\xdfs\x94\xcc\xfa=#,\t\xca\xa8\x83d', 0x0, 0x0) [ 490.329057][T26526] XFS (loop1): log mount failed 08:46:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x200000, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x10000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="01002bbd7000fedbdf250e00000008000400040000000800040006000000080006000200000008000400090000000c00030008000300010000001c00020008000e004e20000008000800080000000800040003000000b12b98825733feb183441420efeb33ae04f6ffaff4f21661c4103393197bbc885fbfb2601a484a496abf48b7dd1b8c8af9ca9a0a1163ea45ec30354ff1330f3fa11274cff28d926e157ac3134c057a2d6d5430867d5e85bad8376cb5ad82a2f2ba0eb703100bf3964f9bd98457d04fc86a6b815f9121a9970e310a191ecb1f7861ee9a53e7b5e9000750d2471d4f5016cb4846272b8ece019b6721ff13"], 0x1}, 0x1, 0x0, 0x0, 0x48810}, 0x40) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000180)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x68}}) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x2, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1}, 0x3c) 08:46:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00l\x00', 0x43732e5398416f17}) 08:46:15 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000140)={0xa6, 0x29, 0x1, {0x2, [{{0x98, 0x2, 0x7}, 0x4, 0x8, 0x7, './file0'}, {{0x20, 0x2, 0x4}, 0x3, 0x5, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0x2, 0x81, 0x7, './file0'}, {{0x23, 0x3, 0x3}, 0x6, 0x15de, 0x7, './file0'}, {{0x8, 0x4, 0x4}, 0x2, 0x0, 0x7, './file0'}]}}, 0xa6) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x400000000000001, 0x0) 08:46:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b500000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f83696c653000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4004000, 0x0, 0x0) 08:46:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00t\x00', 0x43732e5398416f17}) 08:46:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 491.038584][T26790] UBIFS error (pid: 26790): cannot open "./ƒile0", error -22 08:46:16 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xec, 0x400000) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2eac63696c6530000b08f9e981ecf3cc1e0aeb600a04dbf880ffca9adc6982a21bfc86"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080)='C', 0x1, 0x4004000, 0x0, 0x0) 08:46:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b600000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 491.228491][T26899] XFS (loop1): Mounting V4 Filesystem 08:46:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 491.285033][T26913] UBIFS error (pid: 26913): cannot open ".¬cile0", error -22 [ 491.300364][T26899] XFS (loop1): empty log check failed 08:46:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x8000, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x400) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x20) [ 491.332191][T26899] XFS (loop1): log mount/recovery failed: error -5 08:46:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00z\x00', 0x43732e5398416f17}) [ 491.479049][T26899] XFS (loop1): log mount failed [ 491.621902][T27032] UBIFS error (pid: 27032): cannot open "./file0", error -22 [ 491.636284][T27032] UBIFS error (pid: 27032): cannot open "./file0", error -22 08:46:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b700000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/215, 0xd7, 0x100, 0x0, 0x0) 08:46:17 executing program 2: semget(0x2, 0x3, 0x189) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x87\x80\x00', 0x43732e5398416f17}) 08:46:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 492.213143][T27053] UBIFS error (pid: 27053): cannot open "./file0", error -22 [ 492.225324][T27090] UBIFS error (pid: 27090): cannot open "./file0", error -22 08:46:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x8000006, 0x0, 0x0, 0x50000}]}) r0 = memfd_create(0x0, 0x0) fremovexattr(r0, 0x0) 08:46:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'veth0_to_hsr\x00'}) mount(&(0x7f0000000080)=@sg0='/dev/sg0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b800000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 492.469791][T27164] XFS (loop1): Mounting V4 Filesystem 08:46:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x03\xe8\x00', 0x43732e5398416f17}) [ 492.527025][T27164] XFS (loop1): empty log check failed [ 492.554112][T27164] XFS (loop1): log mount/recovery failed: error -5 08:46:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) [ 492.636376][T27233] UBIFS error (pid: 27233): cannot open "/dev/sg0", error -22 [ 492.730294][T27164] XFS (loop1): log mount failed 08:46:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:18 executing program 2: mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500b900000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = inotify_init() fsetxattr(r0, 0x0, 0x0, 0x0, 0x0) 08:46:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\xdd\xfd\x02\x00', 0x43732e5398416f17}) 08:46:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x4000, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x1, r1}) 08:46:18 executing program 4: 08:46:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500ba00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:18 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x12000, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40100, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x103) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) [ 493.513893][T27527] UBIFS error (pid: 27527): cannot open "./file0", error -22 [ 493.525139][T27527] UBIFS error (pid: 27527): cannot open "./file0", error -22 08:46:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:18 executing program 4: 08:46:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\xde\xfd\x02\x00', 0x43732e5398416f17}) 08:46:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500bb00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x4}], 0x2, &(0x7f00000002c0)={[{@prjjquota={'prjjquota', 0x3d, 'ubifs\x00'}}, {@nodiscard='nodiscard'}, {@inline_data='inline_data'}, {@alloc_mode_reuse='alloc_mode=reuse'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}], [{@fowner_gt={'fowner>', r0}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2e2f66696c653002"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x1002000, &(0x7f0000000380)='f2fs\x00') openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x803, 0x0) 08:46:19 executing program 4: 08:46:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 493.946158][T27556] UBIFS error (pid: 27556): cannot open "(null)", error -22 08:46:19 executing program 4: 08:46:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500bc00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 494.031824][T27556] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 494.063588][T27556] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 494.114659][T27556] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 08:46:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:19 executing program 4: 08:46:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 494.253849][T27556] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 08:46:19 executing program 4: 08:46:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\xdf\xfd\x02\x00', 0x43732e5398416f17}) 08:46:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40400, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000a00)=0x1) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:tape_device_t:s0\x00', 0x23, 0x2) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2e2f66696c65300018513d96da1e0be0f7dabfd236ce09b5ed95813f203f226f0da30e7eac35fde8e1e326630d7b049e5171408caacf201a82a13f000000fd91a9b7d2ec2cce64dd1b883739cf7cc78a3d52f16898d66760ce65faea613bbc896bd4de009e704c79891f9890787c54a0f18034bd4fcdd69a6938ae86db47f6842ba89b8c057f48173865bacdfd070bd9eba41f5b0000"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000940)={0x1, 0x1, {0x57, 0xa6c, 0x6, {0x3}, {0x47, 0x3ff}, @cond=[{0x100, 0x3, 0x100000000, 0xd5, 0x4, 0x32cd}, {0x6, 0x8001, 0x5, 0x6, 0xffffffff, 0x9}]}, {0x52, 0x3, 0x2, {0x9, 0x1}, {0x0, 0x5}, @ramp={0xec, 0x0, {0x7ff, 0xdc3, 0xc1c7, 0x5}}}}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000009c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000bc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000b80)={&(0x7f0000000a40)={0x12c, r1, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf63}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x139}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x24000040}, 0x8c1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4e8, 0xc8, 0x248, 0x248, 0x188, 0x188, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, &(0x7f0000000340), {[{{@ip={@empty, @remote, 0xff, 0xffffff00, 'lapb0\x00', 'syzkaller0\x00', {}, {0xff}, 0x66, 0x1, 0x22}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x6, 0xb19, @broadcast, 0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff0000ff, 0x0, 'veth1_to_team\x00', 'team0\x00', {}, {0xe4cd895b1f7b564a}, 0x3d, 0x2, 0x52}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x20, 0x3, 0x1}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x200, 0x200, 0x1, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x11d, 0x6, 0x26}, {0x1, 0x3, 0xffffffff}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0xffffffff, 'eql\x00', 'bridge0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x10}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x4, 0x200}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x7, 0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x548) 08:46:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500bd00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) [ 494.397072][T27556] UBIFS error (pid: 27556): cannot open "", error -22 08:46:19 executing program 4: 08:46:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) [ 494.564194][T27589] XFS (loop1): Mounting V4 Filesystem [ 494.644268][T27589] XFS (loop1): empty log check failed [ 494.684556][T27589] XFS (loop1): log mount/recovery failed: error -5 [ 494.713089][T27613] UBIFS error (pid: 27613): cannot open "./file0", error -22 08:46:20 executing program 4: [ 494.763079][T27616] UBIFS error (pid: 27616): cannot open "./file0", error -22 [ 494.779003][T27589] XFS (loop1): log mount failed 08:46:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/\x00\x00\x00\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) 08:46:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500be00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 08:46:20 executing program 4: 08:46:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\xe0\xfd\x02\x00', 0x43732e5398416f17}) 08:46:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 08:46:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x180) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="75d1d09ce3d7bae479b5f7699a3c4604ccfb60ce4cb478f477cfc2a8ae77ab267584951d6b464679aaaa5dd76ca7c0c55211b95e6e9b8872bef022dc47da1704f05ff6b9cfff468d627db0ee82d5af44a49efbd5d4a025d7a7"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 08:46:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xf0, 0x3e, 0x0, &(0x7f0000000240)="e460cdfbef24080000000a9386dd6a00000000072feb3014cc3ec8a755c1e138ff03ffadfdfbffe6d500bf00000000001400000500243209880bd320d98a", 0x0, 0x10000}, 0x28) 08:46:20 executing program 4: [ 495.435873][T27649] UBIFS error (pid: 27649): cannot open "uÑÐœã׺äyµ÷iš 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 498.252383][T27844] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 498.260780][T27844] RAX: ffffffffffffffda RBX: 00007f9e5afe9b40 RCX: 000000000045c21a [ 498.268736][T27844] RDX: 00007f9e5afe9ae0 RSI: 0000000020000000 RDI: 00007f9e5afe9b00 [ 498.276721][T27844] RBP: 0000000000000001 R08: 00007f9e5afe9b40 R09: 00007f9e5afe9ae0 [ 498.292750][T27844] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 498.300713][T27844] R13: 00000000004c888d R14: 00000000004df4a0 R15: 00000000ffffffff [ 498.308762][T27844] [ 498.311095][T27844] Allocated by task 27844: [ 498.315519][T27844] save_stack+0x23/0x90 [ 498.319681][T27844] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 498.325301][T27844] kasan_kmalloc+0x9/0x10 [ 498.329643][T27844] __kmalloc+0x163/0x770 [ 498.333914][T27844] kmem_alloc+0xd2/0x200 [ 498.338167][T27844] xlog_alloc_log+0xbf4/0x1380 [ 498.344814][T27844] xfs_log_mount+0xdc/0x780 [ 498.349297][T27844] xfs_mountfs+0xdb9/0x1be0 [ 498.353957][T27844] xfs_fs_fill_super+0xcca/0x16e0 [ 498.358980][T27844] mount_bdev+0x304/0x3c0 [ 498.363322][T27844] xfs_fs_mount+0x35/0x40 [ 498.367644][T27844] legacy_get_tree+0x108/0x220 [ 498.372404][T27844] vfs_get_tree+0x8e/0x390 [ 498.376820][T27844] do_mount+0x138c/0x1c00 [ 498.381167][T27844] ksys_mount+0xdb/0x150 [ 498.385489][T27844] __x64_sys_mount+0xbe/0x150 [ 498.390172][T27844] do_syscall_64+0xfd/0x6a0 [ 498.394689][T27844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.400563][T27844] [ 498.402958][T27844] Freed by task 27844: [ 498.407010][T27844] save_stack+0x23/0x90 [ 498.411155][T27844] __kasan_slab_free+0x102/0x150 [ 498.416165][T27844] kasan_slab_free+0xe/0x10 [ 498.420668][T27844] kfree+0x10a/0x2c0 [ 498.424590][T27844] kvfree+0x61/0x70 [ 498.428381][T27844] xlog_alloc_log+0xea9/0x1380 [ 498.433132][T27844] xfs_log_mount+0xdc/0x780 [ 498.437623][T27844] xfs_mountfs+0xdb9/0x1be0 [ 498.442113][T27844] xfs_fs_fill_super+0xcca/0x16e0 [ 498.447124][T27844] mount_bdev+0x304/0x3c0 [ 498.451435][T27844] xfs_fs_mount+0x35/0x40 [ 498.455749][T27844] legacy_get_tree+0x108/0x220 [ 498.460502][T27844] vfs_get_tree+0x8e/0x390 [ 498.464911][T27844] do_mount+0x138c/0x1c00 [ 498.469237][T27844] ksys_mount+0xdb/0x150 [ 498.473458][T27844] __x64_sys_mount+0xbe/0x150 [ 498.478115][T27844] do_syscall_64+0xfd/0x6a0 [ 498.482598][T27844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.488489][T27844] [ 498.490804][T27844] The buggy address belongs to the object at ffff8880926bc900 [ 498.490804][T27844] which belongs to the cache kmalloc-1k of size 1024 [ 498.504869][T27844] The buggy address is located 144 bytes inside of [ 498.504869][T27844] 1024-byte region [ffff8880926bc900, ffff8880926bcd00) [ 498.518205][T27844] The buggy address belongs to the page: [ 498.523845][T27844] page:ffffea000249af00 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0xffff8880926bc480 compound_mapcount: 0 [ 498.536070][T27844] flags: 0x1fffc0000010200(slab|head) [ 498.541432][T27844] raw: 01fffc0000010200 ffffea00026f9688 ffffea0002171b88 ffff8880aa400c40 [ 498.550113][T27844] raw: ffff8880926bc480 ffff8880926bc000 0000000100000004 0000000000000000 [ 498.558681][T27844] page dumped because: kasan: bad access detected [ 498.565071][T27844] [ 498.567378][T27844] Memory state around the buggy address: [ 498.572993][T27844] ffff8880926bc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 498.581040][T27844] ffff8880926bc900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 498.589086][T27844] >ffff8880926bc980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 498.597318][T27844] ^ [ 498.601891][T27844] ffff8880926bca00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 498.609943][T27844] ffff8880926bca80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 498.617999][T27844] ================================================================== [ 498.626053][T27844] Disabling lock debugging due to kernel taint [ 498.634474][T27844] Kernel panic - not syncing: panic_on_warn set ... [ 498.641130][T27844] CPU: 0 PID: 27844 Comm: syz-executor.1 Tainted: G B 5.2.0-rc7-next-20190701 #26 [ 498.651616][T27844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.661661][T27844] Call Trace: [ 498.664958][T27844] dump_stack+0x172/0x1f0 [ 498.669293][T27844] panic+0x2dc/0x755 [ 498.673184][T27844] ? add_taint.cold+0x16/0x16 [ 498.677860][T27844] ? xlog_alloc_log+0x1266/0x1380 [ 498.682884][T27844] ? preempt_schedule+0x4b/0x60 [ 498.687732][T27844] ? ___preempt_schedule+0x16/0x18 [ 498.692839][T27844] ? trace_hardirqs_on+0x5e/0x240 [ 498.697876][T27844] ? xlog_alloc_log+0x1266/0x1380 [ 498.702904][T27844] end_report+0x47/0x4f [ 498.707053][T27844] ? xlog_alloc_log+0x1266/0x1380 [ 498.712074][T27844] __kasan_report.cold+0xe/0x36 [ 498.716922][T27844] ? kvmalloc_node+0x70/0x100 [ 498.721601][T27844] ? xlog_alloc_log+0x1266/0x1380 [ 498.726630][T27844] kasan_report+0x12/0x17 [ 498.730957][T27844] __asan_report_load8_noabort+0x14/0x20 [ 498.736584][T27844] xlog_alloc_log+0x1266/0x1380 [ 498.741433][T27844] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 498.747679][T27844] xfs_log_mount+0xdc/0x780 [ 498.752182][T27844] xfs_mountfs+0xdb9/0x1be0 [ 498.756710][T27844] ? xfs_default_resblks+0x60/0x60 [ 498.761813][T27844] ? init_timer_key+0x13b/0x3a0 [ 498.766662][T27844] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 498.772036][T27844] ? xfs_filestream_get_ag+0x60/0x60 [ 498.777318][T27844] xfs_fs_fill_super+0xcca/0x16e0 [ 498.782368][T27844] mount_bdev+0x304/0x3c0 [ 498.786695][T27844] ? xfs_test_remount_options+0x90/0x90 [ 498.792255][T27844] xfs_fs_mount+0x35/0x40 [ 498.796593][T27844] ? xfs_finish_flags+0x490/0x490 [ 498.801619][T27844] legacy_get_tree+0x108/0x220 [ 498.806383][T27844] ? legacy_parse_monolithic+0x11f/0x180 [ 498.812014][T27844] vfs_get_tree+0x8e/0x390 [ 498.816427][T27844] do_mount+0x138c/0x1c00 [ 498.820758][T27844] ? copy_mount_string+0x40/0x40 [ 498.825697][T27844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.831929][T27844] ? copy_mount_options+0x2e8/0x3f0 [ 498.837124][T27844] ksys_mount+0xdb/0x150 [ 498.841365][T27844] __x64_sys_mount+0xbe/0x150 [ 498.846040][T27844] do_syscall_64+0xfd/0x6a0 [ 498.850542][T27844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.856428][T27844] RIP: 0033:0x45c21a [ 498.860319][T27844] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 498.879916][T27844] RSP: 002b:00007f9e5afe9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 498.888414][T27844] RAX: ffffffffffffffda RBX: 00007f9e5afe9b40 RCX: 000000000045c21a [ 498.896382][T27844] RDX: 00007f9e5afe9ae0 RSI: 0000000020000000 RDI: 00007f9e5afe9b00 [ 498.904349][T27844] RBP: 0000000000000001 R08: 00007f9e5afe9b40 R09: 00007f9e5afe9ae0 [ 498.912343][T27844] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 498.920312][T27844] R13: 00000000004c888d R14: 00000000004df4a0 R15: 00000000ffffffff [ 498.929632][T27844] Kernel Offset: disabled [ 498.934057][T27844] Rebooting in 86400 seconds..